CVE-2025-68195
Description
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode
Running x86_match_min_microcode_rev() on a Zen5 CPU trips up KASAN for an out of bounds access.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An out-of-bounds access in Zen5 microcode revision matching due to a missing array terminator leads to a high-severity memory safety issue in the Linux kernel.
In the Linux kernel, the function x86_match_min_microcode_rev() on a Zen5 CPU triggers an out-of-bounds access because the array zen5_rdseed_microcode lacks a proper terminator [1]. This omission allows the comparison loop to continue past the intended entries, reading beyond the array boundary.
An attacker with local access or the ability to trigger microcode version checks on affected Zen5 systems could exploit this to cause a kernel panic or potentially leverage the out-of-bounds read for information disclosure [1]. The bug manifests during CPU microcode revision matching, a routine operation performed by the kernel.
The impact is rated with a CVSS 7.8 high severity, as it could lead to a denial of service or exposure of sensitive kernel memory [1]. No public exploit code is known, but the out-of-bounds condition is readily reproducible.
A fix has been merged into the stable kernel tree via commit f1fdffe0afea02ba783acfe815b6a60e7180df40 [1]. Users of Zen5 CPUs are advised to apply the latest kernel updates to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.