First published: Sun Dec 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56721 has a medium severity due to the potential for improper handling of CPU microcode which could lead to unexpected behavior.
To fix CVE-2024-56721, upgrade your Linux kernel to versions later than 6.11.11 or 6.12.2.
CVE-2024-56721 affects Linux kernel versions from 6.10 up to 6.11.11 and from 6.12 up to 6.12.2.
As of now, there are no public exploits reported for CVE-2024-56721.
CVE-2024-56721 is caused by an improperly sized erratum_1386_microcode array that lacks an empty entry, leading to potential out-of-bounds access.