ACK: [SRU][J][PATCH v2 00/20] CVE-2024-53114

Sarah Emery sarah.emery at canonical.com
Mon Oct 27 10:59:25 UTC 2025


On 20/10/2025 16:19, Juerg Haefliger wrote:
> https://ubuntu.com/security/CVE-2024-53114
> 
> https://warthogs.atlassian.net/browse/KCVE-1933
> 
> [ Impact ]
> 
> Random AMD Zen4 host reboots wen using virtualized VMLOAD/VMSAVE.
> 
> 
> [ Test Case ]
> 
> Compile-tested only.
> 
> 
> [ Where Problems Could Occur ]
> 
> CPU handling code, specific to AMD ZEN. Could result in problems
> when booting AMD systems.
> 
> 
> [ Notes ]
> 
> Older series are not affected. Newer series are already fixed.
> 
> v2:
>    - Add additional commits identified during review:
>      - 232afb557835d x86/CPU/AMD: Add X86_FEATURE_ZEN1
>      - 15d6daad8f8ad tools headers x86 cpufeatures: Sync with the kernel
>    - That area of the code was heavily refactored, pull in all those
>      commits as well (which are tagged as non-functional changes) to ease
>      future backports.
>    - Pull in additional fixes for all of the above.
>    - Add commits (partial backports) to sync the tools headers to not
>      introduce new perf compile warnings (note that this does not fix any
>      of the existing warnings, just makes sure no new ones are added).
> 
> 
> Arnaldo Carvalho de Melo (2):
>    tools headers cpufeatures: Sync with the kernel sources
>    tools headers x86 cpufeatures: Sync with the kernel sources to pick
>      TDX, Zen, APIC MSR fence changes
> 
> Borislav Petkov (AMD) (14):
>    x86/CPU/AMD: Add ZenX generations flags
>    x86/CPU/AMD: Carve out the erratum 1386 fix
>    x86/CPU/AMD: Move the Zen3 BTC_NO detection to the Zen3 init function
>    x86/CPU/AMD: Move erratum 1076 fix into the Zen1 init function
>    x86/CPU/AMD: Call the spectral chicken in the Zen2 init function
>    x86/CPU/AMD: Rename init_amd_zn() to init_amd_zen_common()
>    x86/CPU/AMD: Move Zenbleed check to the Zen2 init function
>    x86/CPU/AMD: Move the DIV0 bug detection to the Zen1 init function
>    x86/CPU/AMD: Get rid of amd_erratum_1054[]
>    x86/CPU/AMD: Get rid of amd_erratum_383[]
>    x86/CPU/AMD: Get rid of amd_erratum_400[]
>    x86/CPU/AMD: Get rid of amd_erratum_1485[]
>    x86/CPU/AMD: Drop now unused CPU erratum checking function
>    x86/CPU/AMD: Add X86_FEATURE_ZEN1
> 
> John Allen (1):
>    x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode
>      load
> 
> Mario Limonciello (1):
>    x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
> 
> Sandipan Das (1):
>    x86/cpu/amd: Fix workaround for erratum 1054
> 
> Wyes Karny (1):
>    x86: Fix comment for X86_FEATURE_ZEN
> 
>   arch/x86/include/asm/cpufeatures.h       |   6 +-
>   arch/x86/kernel/cpu/amd.c                | 308 ++++++++++++-----------
>   tools/arch/x86/include/asm/cpufeatures.h |   6 +-
>   3 files changed, 171 insertions(+), 149 deletions(-)
> 

Acked-by: Sarah Emery <sarah.emery at canonical.com>



More information about the kernel-team mailing list