CVE-2025-54514
Publication date 10 February 2026
Last updated 27 February 2026
Ubuntu priority
Description
Improper isolation of shared resources on a system on a chip by a malicious local attacker with high privileges could potentially lead to a partial loss of integrity.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| amd64-microcode | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty | Ignored no real-world users |
Notes
rodrigo-zaiden
This is not planned to be fixed for the amd64-microcode package in Ubuntu 14.04 as that release was already outside of the LTS timeframe when this hardware platform was launched AMD released ucode patches for: AMD EPYC 9005 Series: C1:0x0B002151; B0:0x0B10104E These two patches are included in upstream Version: 2025-07-29: Microcode patches in microcode_amd_fam1ah.bin: Family=0x1a Model=0x02 Stepping=0x01: Patch=0x0b002151 Length=14368 bytes Family=0x1a Model=0x11 Stepping=0x00: Patch=0x0b10104e Length=14368 bytes