๐Ÿ” CVE Alert

CVE-2024-56721

HIGH 7.1

x86/CPU/AMD: Terminate the erratum_1386_microcode array

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
29ba89f1895285f06c333546882e0c5ae9a6df23 < 82d6b82cf89d950982ac240ba068c3a7e1f23b0a 29ba89f1895285f06c333546882e0c5ae9a6df23 < ccfee14f08b8699132b87bc6d78e0fa75bf094dd 29ba89f1895285f06c333546882e0c5ae9a6df23 < ff6cdc407f4179748f4673c39b0921503199a0ad
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/82d6b82cf89d950982ac240ba068c3a7e1f23b0a git.kernel.org: https://git.kernel.org/stable/c/ccfee14f08b8699132b87bc6d78e0fa75bf094dd git.kernel.org: https://git.kernel.org/stable/c/ff6cdc407f4179748f4673c39b0921503199a0ad