First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Detect when STB is not available Loading the amd_pmc module as: amd_pmc enable_stb=1 ...can result in the following messages in the kernel ring buffer: amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff ioremap on RAM at 0x0000000000000000 - 0x0000000000ffffff WARNING: CPU: 10 PID: 2151 at arch/x86/mm/ioremap.c:217 __ioremap_caller+0x2cd/0x340 Further debugging reveals that this occurs when the requests for S2D_PHYS_ADDR_LOW and S2D_PHYS_ADDR_HIGH return a value of 0, indicating that the STB is inaccessible. To prevent the ioremap warning and provide clarity to the user, handle the invalid address and display an error message.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.18<6.1.117 | |
Linux Kernel | >=6.2<6.6.61 | |
Linux Kernel | >=6.7<6.11.8 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53072 is considered a medium-severity vulnerability in the Linux kernel.
To mitigate CVE-2024-53072, ensure that you are using an updated version of the Linux kernel that has addressed this vulnerability.
CVE-2024-53072 affects Linux kernel versions from 5.18 to 6.1.117 and 6.2 to 6.6.61, as well as various release candidates of version 6.12.
CVE-2024-53072 resolves a problem with the amd_pmc module where enabling STB can lead to kernel ring buffer log messages when STB is not available.
Yes, there are patches available in newer versions of the Linux kernel that fix the issues described in CVE-2024-53072.