CVE-2024-50275

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50275
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50275.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50275
Downstream
Related
Published
2024-11-19T01:30:15.293Z
Modified
2025-11-28T02:34:22.115660Z
Summary
arm64/sve: Discard stale CPU state when handling SVE traps
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64/sve: Discard stale CPU state when handling SVE traps

The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIFSVE set and TIFFOREIGNFPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enabled). This has been observed to result in warnings from dosveacc() where SVE traps are not expected while TIFSVE is set:

| if (testandsetthreadflag(TIFSVE)) | WARNON(1); /* SVE access shouldn't have trapped */

Warnings of this form have been reported intermittently, e.g.

https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/ https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/

The race can occur when the SVE trap handler is preempted before and after manipulating the saved FPSIMD/SVE state, starting and ending on the same CPU, e.g.

| void dosveacc(unsigned long esr, struct ptregs *regs) | { | // Trap on CPU 0 with TIFSVE clear, SVE traps enabled | // task->fpsimdcpu is 0. | // percpuptr(&fpsimdlaststate, 0) is task. | | ... | | // Preempted; migrated from CPU 0 to CPU 1. | // TIFFOREIGNFPSTATE is set. | | getcpufpsimdcontext(); | | if (testandsetthreadflag(TIFSVE)) | WARNON(1); /* SVE access shouldn't have trapped */ | | sveinitregs() { | if (!testthreadflag(TIFFOREIGNFPSTATE)) { | ... | } else { | fpsimdtosve(current); | current->thread.fptype = FPSTATESVE; | } | } | | putcpufpsimdcontext(); | | // Preempted; migrated from CPU 1 to CPU 0. | // task->fpsimdcpu is still 0 | // If percpuptr(&fpsimdlaststate, 0) is still task then: | // - Stale HW state is reused (with SVE traps enabled) | // - TIFFOREIGN_FPSTATE is cleared | // - A return to userspace skips HW state restore | }

Fix the case where the state is not live and TIFFOREIGNFPSTATE is set by calling fpsimdflushtaskstate() to detach from the saved CPU state. This ensures that a subsequent context switch will not reuse the stale CPU state, and will instead set TIFFOREIGN_FPSTATE, forcing the new state to be reloaded from memory prior to a return to userspace.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50275.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cccb78ce89c45a4414db712be4986edfb92434bd
Fixed
51d3d80a6dc314982a9a0aeb0961085922a1aa15
Fixed
de529504b3274d57caf8f66800b714b0d3ee235a
Fixed
51d11ea0250d6ee461987403bbfd4b2abb5613a7
Fixed
fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9
Fixed
751ecf6afd6568adc98f2a6052315552c0483d18

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.174
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.120
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.61
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.8