Discard stale CPU state when handling SVE traps
CVE-2024-50275

7HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
19 November 2024

What is CVE-2024-50275?

A vulnerability has been identified in the Linux kernel concerning the handling of Scalable Vector Extension (SVE) traps on the ARM64 architecture. The issue arises from incorrect manipulation of the saved Floating Point SIMD (FPSIMD) and SVE state, which can lead to a race condition during preemption. This race condition may result in a thread exhibiting TIF_SVE set alongside TIF_FOREIGN_FPSTATE clear, despite the fact that the live CPU state has become stale when SVE traps are enabled. This situation can trigger unexpected warnings from the function do_sve_acc() due to the improper access of hardware resources, putting system integrity at risk. The kernel's corrective measure involves ensuring that stale CPU states are not reused during context switches, by triggering appropriate state flushes that guarantee the latest state is retrieved before user-space execution resumes.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux cccb78ce89c45a4414db712be4986edfb92434bd < 51d3d80a6dc314982a9a0aeb0961085922a1aa15

Linux cccb78ce89c45a4414db712be4986edfb92434bd

Linux cccb78ce89c45a4414db712be4986edfb92434bd < 51d11ea0250d6ee461987403bbfd4b2abb5613a7

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.