CVE-2024-56721

Source
https://cve.org/CVERecord?id=CVE-2024-56721
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56721.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56721
Downstream
Related
Published
2024-12-29T11:29:59.164Z
Modified
2026-05-15T04:12:20.423993429Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
x86/CPU/AMD: Terminate the erratum_1386_microcode array
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Terminate the erratum1386microcode array

The erratum1386microcode array requires an empty entry at the end. Otherwise x86matchcpuwithstepping() will continue iterate the array after it ended.

Add an empty entry to erratum1386microcode to its end.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56721.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.11.11
Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56721.json"