ACK: [SRU][J][PATCH v2 0/1] CVE-2024-56721

Andrei Gherzan andrei.gherzan at canonical.com
Thu Apr 3 10:39:03 UTC 2025


On 25/04/01 02:39pm, Kevin Becker wrote:
> https://ubuntu.com/security/CVE-2024-56721
> 
> [ Impact ]
> 
> x86/CPU/AMD: Terminate the erratum_1386_microcode array
> 
> The erratum_1386_microcode array requires an empty entry at the end. 
> Otherwise x86_match_cpu_with_stepping() will continue iterate the array 
> after it ended. Add an empty entry to erratum_1386_microcode to its end.
> 
> [ Fix ]
> 
> Oracular:       fixed via stable updates
> Noble:          fixed via stable updates
> Jammy:          backport
> Focal:          not affected
> Bionic:         not affected
> Xenial:         not affected
> 
> [ Test Plan ]
> 
> * Build test for all supported architectures.
> * Boot tested on amd64 architecture.
> 
> [ Where Problems Could Occur ]
> 
> This patch affects AMD CPUs. However, the change is very minimal, so 
> it should not cause a problem there is code that can't handle an 
> empty entry in the erratum_1386_microcode array.
> 
> Sebastian Andrzej Siewior (1):
>   x86/CPU/AMD: Terminate the erratum_1386_microcode array
> 
>  arch/x86/kernel/cpu/amd.c | 1 +
>  1 file changed, 1 insertion(+)

Acked-by: Andrei Gherzan <andrei.gherzan at canonical.com>

-- 
Andrei Gherzan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20250403/952447fb/attachment.sig>


More information about the kernel-team mailing list