In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
The erratum_1386_microcode array requires an empty entry at the end.
Otherwise x86_match_cpu_with_stepping() will continue iterate the array after
it ended.
Add an empty entry to erratum_1386_microcode to its end.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-12-29 12:15
Updated : 2025-10-01 20:17
NVD link : CVE-2024-56721
Mitre link : CVE-2024-56721
CVE.ORG link : CVE-2024-56721
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
