In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd/pmc: Detect when STB is not available
Loading the amd_pmc module as:
amd_pmc enable_stb=1
...can result in the following messages in the kernel ring buffer:
amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff
ioremap on RAM at 0x0000000000000000 - 0x0000000000ffffff
WARNING: CPU: 10 PID: 2151 at arch/x86/mm/ioremap.c:217 __ioremap_caller+0x2cd/0x340
Further debugging reveals that this occurs when the requests for
S2D_PHYS_ADDR_LOW and S2D_PHYS_ADDR_HIGH return a value of 0,
indicating that the STB is inaccessible. To prevent the ioremap
warning and provide clarity to the user, handle the invalid address
and display an error message.
References
Configurations
Configuration 1 (hide)
|
History
25 Nov 2024, 20:43
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/67ff30e24a0466bdd5be1d0b84385ec3c85fdacd - Patch | |
References | () https://git.kernel.org/stable/c/7a3ed3f125292bc3398e04d10108124250892e3f - Patch | |
References | () https://git.kernel.org/stable/c/a50863dd1f92d43c975ab2ecc3476617fe98a66e - Patch | |
References | () https://git.kernel.org/stable/c/bceec87a73804bb4c33b9a6c96e2d27cd893a801 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
|
Summary |
|
19 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-19 18:15
Updated : 2024-11-25 20:43
NVD link : CVE-2024-53072
Mitre link : CVE-2024-53072
CVE.ORG link : CVE-2024-53072
JSON object : View
Products Affected
linux
- linux_kernel
CWE