[SRU][J][PATCH 0/1] CVE-2024-56721

Kevin Becker kevin.becker at canonical.com
Mon Mar 24 14:28:39 UTC 2025


https://ubuntu.com/security/CVE-2024-56721

[ Impact ]

x86/CPU/AMD: Terminate the erratum_1386_microcode array

The erratum_1386_microcode array requires an empty entry at the end. 
Otherwise x86_match_cpu_with_stepping() will continue iterate the array 
after it ended. Add an empty entry to erratum_1386_microcode to its end.

[ Fix ]

Oracular:       fixed via stable updates
Noble:          fixed via stable updates
Jammy:          backport
Focal:          not affected
Bionic:         not affected
Xenial:         not affected

[ Test Plan ]

* Build test for all supported architectures.
* Boot tested on amd64 architecture.

[ Where Problems Could Occur ]

This patch affects AMD CPUs. However, the change is very minimal, so 
it should not cause a problem there is code that can't handle an 
empty entry in the erratum_1386_microcode array.

Sebastian Andrzej Siewior (1):
  x86/CPU/AMD: Terminate the erratum_1386_microcode array

 arch/x86/kernel/cpu/amd.c | 1 +
 1 file changed, 1 insertion(+)

-- 
2.43.0




More information about the kernel-team mailing list