CVE-2021-47226
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
29/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer<br />
<br />
Both Intel and AMD consider it to be architecturally valid for XRSTOR to<br />
fail with #PF but nonetheless change the register state. The actual<br />
conditions under which this might occur are unclear [1], but it seems<br />
plausible that this might be triggered if one sibling thread unmaps a page<br />
and invalidates the shared TLB while another sibling thread is executing<br />
XRSTOR on the page in question.<br />
<br />
__fpu__restore_sig() can execute XRSTOR while the hardware registers<br />
are preserved on behalf of a different victim task (using the<br />
fpu_fpregs_owner_ctx mechanism), and, in theory, XRSTOR could fail but<br />
modify the registers.<br />
<br />
If this happens, then there is a window in which __fpu__restore_sig()<br />
could schedule out and the victim task could schedule back in without<br />
reloading its own FPU registers. This would result in part of the FPU<br />
state that __fpu__restore_sig() was attempting to load leaking into the<br />
victim task&#39;s user-visible state.<br />
<br />
Invalidate preserved FPU registers on XRSTOR failure to prevent this<br />
situation from corrupting any state.<br />
<br />
[1] Frequent readers of the errata lists might imagine "complex<br />
microarchitectural conditions".
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 5.10.46 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.13 (excluding) |
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14
- https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817
- https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a
- https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14
- https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817
- https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a