Impact
In the Linux kernel, a modification of CPUID after loading CR3 can trigger a WARN in the KVM AMD nested virtualization code. The warning does not block execution, does not alter privilege levels, and provides no meaningful protection for the kernel or its users. Consequently, it is considered a harmless diagnostic message rather than an exploit.
Affected Systems
The vulnerability affects any Linux kernel that includes the kvm_amd module before the fix that removes the warning, regardless of distribution. It is specifically relevant when KVM is used to run nested virtual machines, since the bug is triggered by manipulating CPUID after setting SREGS in a virtual CPU.
Risk and Exploitability
No CVSS score is provided, and the EPSS score is unavailable. The issue is not listed in CISA’s KEV catalog, indicating no known live exploits. Because the warning can be triggered from userspace but does not compromise kernel integrity or confidentiality, the risk of exploitation is negligible.
OpenCVE Enrichment