Description
In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.
References (3)
Core 3
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
1.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (3)
linux/Kernel
6.10.0 - 6.11.11linux
linux/Kernel
6.12.0 - 6.12.2linux
linux/linux_kernel
6.10 - 6.11.11
Published
Dec 29, 2024
Tracked Since
Feb 18, 2026