CVE-2024-50275
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arm64/sve: Discard stale CPU state when handling SVE traps<br />
<br />
The logic for handling SVE traps manipulates saved FPSIMD/SVE state<br />
incorrectly, and a race with preemption can result in a task having<br />
TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state<br />
is stale (e.g. with SVE traps enabled). This has been observed to result<br />
in warnings from do_sve_acc() where SVE traps are not expected while<br />
TIF_SVE is set:<br />
<br />
| if (test_and_set_thread_flag(TIF_SVE))<br />
| WARN_ON(1); /* SVE access shouldn&#39;t have trapped */<br />
<br />
Warnings of this form have been reported intermittently, e.g.<br />
<br />
https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/<br />
https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/<br />
<br />
The race can occur when the SVE trap handler is preempted before and<br />
after manipulating the saved FPSIMD/SVE state, starting and ending on<br />
the same CPU, e.g.<br />
<br />
| void do_sve_acc(unsigned long esr, struct pt_regs *regs)<br />
| {<br />
| // Trap on CPU 0 with TIF_SVE clear, SVE traps enabled<br />
| // task->fpsimd_cpu is 0.<br />
| // per_cpu_ptr(&fpsimd_last_state, 0) is task.<br />
|<br />
| ...<br />
|<br />
| // Preempted; migrated from CPU 0 to CPU 1.<br />
| // TIF_FOREIGN_FPSTATE is set.<br />
|<br />
| get_cpu_fpsimd_context();<br />
|<br />
| if (test_and_set_thread_flag(TIF_SVE))<br />
| WARN_ON(1); /* SVE access shouldn&#39;t have trapped */<br />
|<br />
| sve_init_regs() {<br />
| if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {<br />
| ...<br />
| } else {<br />
| fpsimd_to_sve(current);<br />
| current->thread.fp_type = FP_STATE_SVE;<br />
| }<br />
| }<br />
|<br />
| put_cpu_fpsimd_context();<br />
|<br />
| // Preempted; migrated from CPU 1 to CPU 0.<br />
| // task->fpsimd_cpu is still 0<br />
| // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then:<br />
| // - Stale HW state is reused (with SVE traps enabled)<br />
| // - TIF_FOREIGN_FPSTATE is cleared<br />
| // - A return to userspace skips HW state restore<br />
| }<br />
<br />
Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set<br />
by calling fpsimd_flush_task_state() to detach from the saved CPU<br />
state. This ensures that a subsequent context switch will not reuse the<br />
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the<br />
new state to be reloaded from memory prior to a return to userspace.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 6.6.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/51d11ea0250d6ee461987403bbfd4b2abb5613a7
- https://git.kernel.org/stable/c/51d3d80a6dc314982a9a0aeb0961085922a1aa15
- https://git.kernel.org/stable/c/751ecf6afd6568adc98f2a6052315552c0483d18
- https://git.kernel.org/stable/c/de529504b3274d57caf8f66800b714b0d3ee235a
- https://git.kernel.org/stable/c/fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



