CVE-2025-37751 — Buffer Access with Incorrect Length Value in Linux
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 77.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateJul 8
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/cpu: Avoid running off the end of an AMD erratum table
The NULL array terminator at the end of erratum_1386_microcode was
removed during the switch from x86_cpu_desc to x86_cpu_id. This
causes readers to run off the end of the array.
Replace the NULL.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linuxf3f3251526739bb975b97f840c56b3054dba8638 — 1b518f73f1b6f59e083ec33dea22d9a1a275a970+2
Patches
🔴Vulnerability Details
5OSV▶
CVE-2025-37751: In the Linux kernel, the following vulnerability has been resolved: x86/cpu: Avoid running off the end of an AMD erratum table The NULL array terminat↗2025-05-01
GHSA▶
GHSA-w8jp-xg39-86rf: In the Linux kernel, the following vulnerability has been resolved:
x86/cpu: Avoid running off the end of an AMD erratum table
The NULL array termin↗2025-05-01
📋Vendor Advisories
5Debian▶
CVE-2025-37751: linux - In the Linux kernel, the following vulnerability has been resolved: x86/cpu: Av...↗2025