CVE-2024-50102
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86: fix user address masking non-canonical speculation issue<br />
<br />
It turns out that AMD has a "Meltdown Lite(tm)" issue with non-canonical<br />
accesses in kernel space. And so using just the high bit to decide<br />
whether an access is in user space or kernel space ends up with the good<br />
old "leak speculative data" if you have the right gadget using the<br />
result:<br />
<br />
CVE-2020-12965 “Transient Execution of Non-Canonical Accesses“<br />
<br />
Now, the kernel surrounds the access with a STAC/CLAC pair, and those<br />
instructions end up serializing execution on older Zen architectures,<br />
which closes the speculation window.<br />
<br />
But that was true only up until Zen 5, which renames the AC bit [1].<br />
That improves performance of STAC/CLAC a lot, but also means that the<br />
speculation window is now open.<br />
<br />
Note that this affects not just the new address masking, but also the<br />
regular valid_user_address() check used by access_ok(), and the asm<br />
version of the sign bit check in the get_user() helpers.<br />
<br />
It does not affect put_user() or clear_user() variants, since there&#39;s no<br />
speculative result to be used in a gadget for those operations.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



