Advisory Published
Updated

CVE-2024-53072: platform/x86/amd/pmc: Detect when STB is not available

First published: Tue Nov 19 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Detect when STB is not available Loading the amd_pmc module as: amd_pmc enable_stb=1 ...can result in the following messages in the kernel ring buffer: amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff ioremap on RAM at 0x0000000000000000 - 0x0000000000ffffff WARNING: CPU: 10 PID: 2151 at arch/x86/mm/ioremap.c:217 __ioremap_caller+0x2cd/0x340 Further debugging reveals that this occurs when the requests for S2D_PHYS_ADDR_LOW and S2D_PHYS_ADDR_HIGH return a value of 0, indicating that the STB is inaccessible. To prevent the ioremap warning and provide clarity to the user, handle the invalid address and display an error message.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel>=5.18<6.1.117
Linux Kernel>=6.2<6.6.61
Linux Kernel>=6.7<6.11.8
Linux Kernel=6.12-rc1
Linux Kernel=6.12-rc2
Linux Kernel=6.12-rc3
Linux Kernel=6.12-rc4
Linux Kernel=6.12-rc5
Linux Kernel=6.12-rc6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-53072?

    CVE-2024-53072 is considered a medium-severity vulnerability in the Linux kernel.

  • How can I mitigate CVE-2024-53072?

    To mitigate CVE-2024-53072, ensure that you are using an updated version of the Linux kernel that has addressed this vulnerability.

  • Which versions of the Linux kernel are affected by CVE-2024-53072?

    CVE-2024-53072 affects Linux kernel versions from 5.18 to 6.1.117 and 6.2 to 6.6.61, as well as various release candidates of version 6.12.

  • What issue does CVE-2024-53072 address in the Linux kernel?

    CVE-2024-53072 resolves a problem with the amd_pmc module where enabling STB can lead to kernel ring buffer log messages when STB is not available.

  • Is there a patch available for CVE-2024-53072?

    Yes, there are patches available in newer versions of the Linux kernel that fix the issues described in CVE-2024-53072.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203