Out-of-Bounds Affecting kernel-debuginfo-common-ppc64le package, versions <0:6.12.0-55.27.1.el10_0


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS10-KERNELDEBUGINFOCOMMONPPC64LE-11779930
  • published12 Aug 2025
  • disclosed29 Dec 2024

Introduced: 29 Dec 2024

CVE-2024-56721  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Centos:10 kernel-debuginfo-common-ppc64le to version 0:6.12.0-55.27.1.el10_0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-debuginfo-common-ppc64le package and not the kernel-debuginfo-common-ppc64le package as distributed by Centos. See How to fix? for Centos:10 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Terminate the erratum_1386_microcode array

The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended.

Add an empty entry to erratum_1386_microcode to its end.

CVSS Base Scores

version 3.1