摘要:
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
The erratum_1386_microcode array requires an empty entry at the end.
Otherwise x86_match_cpu_with_stepping() will continue iterate the array after
it ended.
Add an empty entry to erratum_1386_microcode to its end.
安全等级: Low
公告ID: KylinSec-SA-2024-4593
发布日期: 2025年1月15日
关联CVE: CVE-2024-56721
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
The erratum_1386_microcode array requires an empty entry at the end.
Otherwise x86_match_cpu_with_stepping() will continue iterate the array after
it ended.
Add an empty entry to erratum_1386_microcode to its end.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-56721 | KY3.4-5 | kernel | Unaffected |
CVE-2024-56721 | KY3.5.3 | kernel | Unaffected |
CVE-2024-56721 | V6 | kernel | Unaffected |