First published: Mon Dec 02 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client A number of Zen4 client SoCs advertise the ability to use virtualized VMLOAD/VMSAVE, but using these instructions is reported to be a cause of a random host reboot. These instructions aren't intended to be advertised on Zen4 client so clear the capability.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.11.10 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 | |
Linux Kernel | =6.12-rc7 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.135-1 | 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53114 is considered a high severity vulnerability in the Linux kernel related to the handling of virtualized VMLOAD/VMSAVE instructions.
To fix CVE-2024-53114, you should upgrade to Linux kernel version 6.11.10 or later versions that contain the patch for this vulnerability.
CVE-2024-53114 affects Linux kernels prior to 6.11.10 and various release candidates of version 6.12.
CVE-2024-53114 can lead to potential security risks due to improper handling of virtualized CPU instructions, increasing the likelihood of exploitation.
There are no official workarounds for CVE-2024-53114; the recommended action is applying the appropriate kernel updates.