CVE-2025-22013
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/04/2025
Last modified:
28/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state<br />
<br />
There are several problems with the way hyp code lazily saves the host&#39;s<br />
FPSIMD/SVE state, including:<br />
<br />
* Host SVE being discarded unexpectedly due to inconsistent<br />
configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to<br />
result in QEMU crashes where SVE is used by memmove(), as reported by<br />
Eric Auger:<br />
<br />
https://issues.redhat.com/browse/RHEL-68997<br />
<br />
* Host SVE state is discarded *after* modification by ptrace, which was an<br />
unintentional ptrace ABI change introduced with lazy discarding of SVE state.<br />
<br />
* The host FPMR value can be discarded when running a non-protected VM,<br />
where FPMR support is not exposed to a VM, and that VM uses<br />
FPSIMD/SVE. In these cases the hyp code does not save the host&#39;s FPMR<br />
before unbinding the host&#39;s FPSIMD/SVE/SME state, leaving a stale<br />
value in memory.<br />
<br />
Avoid these by eagerly saving and "flushing" the host&#39;s FPSIMD/SVE/SME<br />
state when loading a vCPU such that KVM does not need to save any of the<br />
host&#39;s FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is<br />
removed and the necessary call to fpsimd_save_and_flush_cpu_state() is<br />
placed in kvm_arch_vcpu_load_fp(). As &#39;fpsimd_state&#39; and &#39;fpmr_ptr&#39;<br />
should not be used, they are set to NULL; all uses of these will be<br />
removed in subsequent patches.<br />
<br />
Historical problems go back at least as far as v5.17, e.g. erroneous<br />
assumptions about TIF_SVE being clear in commit:<br />
<br />
8383741ab2e773a9 ("KVM: arm64: Get rid of host SVE tracking/saving")<br />
<br />
... and so this eager save+flush probably needs to be backported to ALL<br />
stable trees.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.85 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/04c50cc23a492c4d43fdaefc7c1ecc0ff6f7b82e
- https://git.kernel.org/stable/c/5289ac43b69c61a49c75720921f2008005a31c43
- https://git.kernel.org/stable/c/79e140bba70bcacc5fe15bf8c0b958793fd7d56f
- https://git.kernel.org/stable/c/806d5c1e1d2e5502175a24bf70f251648d99c36a
- https://git.kernel.org/stable/c/900b444be493b7f404898c785d6605b177a093d0
- https://git.kernel.org/stable/c/fbc7e61195e23f744814e78524b73b59faa54ab4



