CVE-2025-52534

Publication date 10 February 2026

Last updated 27 February 2026


Ubuntu priority

Description

Improper bound check within AMD CPU microcode can allow a malicious guest to write to host memory, potentially resulting in loss of integrity.

Read the notes from the security team

Status

Package Ubuntu Release Status
amd64-microcode 25.10 questing
Needs evaluation
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty Ignored no real-world users

Notes


rodrigo-zaiden

This is not planned to be fixed for the amd64-microcode package in Ubuntu 14.04 as that release was already outside of the LTS timeframe when this hardware platform was launched AMD released ucode patches for: AMD EPYC 9005 Series: Dense B0:0x0B10104E. This patch is included in upstream Version: 2025-07-29: Microcode patches in microcode_amd_fam1ah.bin: Family=0x1a Model=0x11 Stepping=0x00: Patch=0x0b10104e Length=14368 bytes

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
amd64-microcode