ACK: [SRU][J][PATCH v2 0/1] CVE-2024-56721

Massimiliano Pellizzer massimiliano.pellizzer at canonical.com
Tue Apr 1 21:35:32 UTC 2025


On Tue, 1 Apr 2025 at 20:40, Kevin Becker <kevin.becker at canonical.com> wrote:
>
> https://ubuntu.com/security/CVE-2024-56721
>
> [ Impact ]
>
> x86/CPU/AMD: Terminate the erratum_1386_microcode array
>
> The erratum_1386_microcode array requires an empty entry at the end.
> Otherwise x86_match_cpu_with_stepping() will continue iterate the array
> after it ended. Add an empty entry to erratum_1386_microcode to its end.
>
> [ Fix ]
>
> Oracular:       fixed via stable updates
> Noble:          fixed via stable updates
> Jammy:          backport
> Focal:          not affected
> Bionic:         not affected
> Xenial:         not affected
>
> [ Test Plan ]
>
> * Build test for all supported architectures.
> * Boot tested on amd64 architecture.
>
> [ Where Problems Could Occur ]
>
> This patch affects AMD CPUs. However, the change is very minimal, so
> it should not cause a problem there is code that can't handle an
> empty entry in the erratum_1386_microcode array.
>
> Sebastian Andrzej Siewior (1):
>   x86/CPU/AMD: Terminate the erratum_1386_microcode array
>
>  arch/x86/kernel/cpu/amd.c | 1 +
>  1 file changed, 1 insertion(+)
>
> --
> 2.43.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

The patch looks good.
Please next time specify what's changed between
v1 and v2 in the cover letter.

Acked-by: Massimiliano Pellizzer <massimiliano.pellizzer at canonical.com>

-- 
Massimiliano Pellizzer



More information about the kernel-team mailing list