CVE-2025-37751

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37751
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37751.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-37751
Downstream
Published
2025-05-01T12:55:56Z
Modified
2025-10-15T23:44:15.389563Z
Summary
x86/cpu: Avoid running off the end of an AMD erratum table
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/cpu: Avoid running off the end of an AMD erratum table

The NULL array terminator at the end of erratum1386microcode was removed during the switch from x86cpudesc to x86cpuid. This causes readers to run off the end of the array.

Replace the NULL.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f3f3251526739bb975b97f840c56b3054dba8638
Fixed
1b518f73f1b6f59e083ec33dea22d9a1a275a970
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f3f3251526739bb975b97f840c56b3054dba8638
Fixed
f0df00ebc57f803603f2a2e0df197e51f06fbe90

Affected versions

v6.*

v6.13
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.14.2
v6.15-rc1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.14.3