CVE-2025-52534
Publication date 10 February 2026
Last updated 27 February 2026
Ubuntu priority
Description
Improper bound check within AMD CPU microcode can allow a malicious guest to write to host memory, potentially resulting in loss of integrity.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| amd64-microcode | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty | Ignored no real-world users |
Notes
rodrigo-zaiden
This is not planned to be fixed for the amd64-microcode package in Ubuntu 14.04 as that release was already outside of the LTS timeframe when this hardware platform was launched AMD released ucode patches for: AMD EPYC 9005 Series: Dense B0:0x0B10104E. This patch is included in upstream Version: 2025-07-29: Microcode patches in microcode_amd_fam1ah.bin: Family=0x1a Model=0x11 Stepping=0x00: Patch=0x0b10104e Length=14368 bytes