[SRU][J][PATCH 0/1] CVE-2024-56721
Kevin Becker
kevin.becker at canonical.com
Mon Mar 24 14:28:39 UTC 2025
https://ubuntu.com/security/CVE-2024-56721
[ Impact ]
x86/CPU/AMD: Terminate the erratum_1386_microcode array
The erratum_1386_microcode array requires an empty entry at the end.
Otherwise x86_match_cpu_with_stepping() will continue iterate the array
after it ended. Add an empty entry to erratum_1386_microcode to its end.
[ Fix ]
Oracular: fixed via stable updates
Noble: fixed via stable updates
Jammy: backport
Focal: not affected
Bionic: not affected
Xenial: not affected
[ Test Plan ]
* Build test for all supported architectures.
* Boot tested on amd64 architecture.
[ Where Problems Could Occur ]
This patch affects AMD CPUs. However, the change is very minimal, so
it should not cause a problem there is code that can't handle an
empty entry in the erratum_1386_microcode array.
Sebastian Andrzej Siewior (1):
x86/CPU/AMD: Terminate the erratum_1386_microcode array
arch/x86/kernel/cpu/amd.c | 1 +
1 file changed, 1 insertion(+)
--
2.43.0
More information about the kernel-team
mailing list