Cmnt: [SRU][J][PATCH 0/3] CVE-2024-53114
Massimiliano Pellizzer
massimiliano.pellizzer at canonical.com
Tue Oct 14 18:02:50 UTC 2025
On Tue, 14 Oct 2025 at 10:20, Juerg Haefliger
<juerg.haefliger at canonical.com> wrote:
>
> https://ubuntu.com/security/CVE-2024-53114
>
>
> [ Impact ]
>
> Random AMD Zen4 host reboots wen using virtualized VMLOAD/VMSAVE.
>
>
> [ Test Case ]
>
> Compile-tested only.
>
>
> [ Where Problems Could Occur ]
>
> CPU handling code, specific to AMD ZEN. Could result in problems
> when booting AMD systems.
>
>
> [ Notes ]
>
> Older series are not affected. Newer series are already fixed.
>
>
>
> Borislav Petkov (AMD) (1):
> x86/CPU/AMD: Add ZenX generations flags
>
> Mario Limonciello (1):
> x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
>
> Wyes Karny (1):
> x86: Fix comment for X86_FEATURE_ZEN
>
> arch/x86/include/asm/cpufeatures.h | 5 +-
> arch/x86/kernel/cpu/amd.c | 80 +++++++++++++++++++++++++++++-
> 2 files changed, 82 insertions(+), 3 deletions(-)
>
> --
> 2.48.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
The second patch 30fa92832f40 (x86/CPU/AMD: Add ZenX generations
flags) might have two follow ups:
- 232afb557835d x86/CPU/AMD: Add X86_FEATURE_ZEN1
- 15d6daad8f8ad tools headers x86 cpufeatures: Sync with the kernel
sources to pick TDX, Zen, APIC MSR fence changes
The second one in particular seems to solve some compile time warnings in perf.
Do you think they are needed?
--
Massimiliano Pellizzer
More information about the kernel-team
mailing list