ACK: [SRU][J][PATCH v2 0/1] CVE-2024-56721
Kuba Pawlak
kuba.pawlak at canonical.com
Wed Apr 2 09:37:52 UTC 2025
On 1.04.2025 20:39, Kevin Becker wrote:
> https://ubuntu.com/security/CVE-2024-56721
>
> [ Impact ]
>
> x86/CPU/AMD: Terminate the erratum_1386_microcode array
>
> The erratum_1386_microcode array requires an empty entry at the end.
> Otherwise x86_match_cpu_with_stepping() will continue iterate the array
> after it ended. Add an empty entry to erratum_1386_microcode to its end.
>
> [ Fix ]
>
> Oracular: fixed via stable updates
> Noble: fixed via stable updates
> Jammy: backport
> Focal: not affected
> Bionic: not affected
> Xenial: not affected
>
> [ Test Plan ]
>
> * Build test for all supported architectures.
> * Boot tested on amd64 architecture.
>
> [ Where Problems Could Occur ]
>
> This patch affects AMD CPUs. However, the change is very minimal, so
> it should not cause a problem there is code that can't handle an
> empty entry in the erratum_1386_microcode array.
>
> Sebastian Andrzej Siewior (1):
> x86/CPU/AMD: Terminate the erratum_1386_microcode array
>
> arch/x86/kernel/cpu/amd.c | 1 +
> 1 file changed, 1 insertion(+)
>
Acked-by: Kuba Pawlak <kuba.pawlak at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x216A9D7E3B63DCB4.asc
Type: application/pgp-keys
Size: 3139 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20250402/8d3f9a91/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20250402/8d3f9a91/attachment.sig>
More information about the kernel-team
mailing list