Bug 2327198 (CVE-2024-50275) - CVE-2024-50275 kernel: arm64/sve: Discard stale CPU state when handling SVE traps
Summary: CVE-2024-50275 kernel: arm64/sve: Discard stale CPU state when handling SVE t...
Keywords:
Status: NEW
Alias: CVE-2024-50275
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2327221
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-19 02:03 UTC by OSIDB Bzimport
Modified: 2025-04-25 17:25 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2025:0659 0 None None None 2025-01-23 08:37:11 UTC
Red Hat Product Errata RHBA-2025:1232 0 None None None 2025-02-10 14:28:55 UTC
Red Hat Product Errata RHBA-2025:1272 0 None None None 2025-02-11 06:07:56 UTC
Red Hat Product Errata RHBA-2025:1273 0 None None None 2025-02-11 06:08:22 UTC
Red Hat Product Errata RHBA-2025:1406 0 None None None 2025-02-13 08:38:19 UTC
Red Hat Product Errata RHBA-2025:1672 0 None None None 2025-02-19 10:48:49 UTC
Red Hat Product Errata RHSA-2025:0578 0 None None None 2025-01-22 02:06:03 UTC
Red Hat Product Errata RHSA-2025:1067 0 None None None 2025-02-05 11:17:58 UTC
Red Hat Product Errata RHSA-2025:1068 0 None None None 2025-02-05 11:34:10 UTC
Red Hat Product Errata RHSA-2025:1658 0 None None None 2025-02-19 00:51:00 UTC
Red Hat Product Errata RHSA-2025:2525 0 None None None 2025-03-10 15:40:02 UTC

Description OSIDB Bzimport 2024-11-19 02:03:21 UTC
In the Linux kernel, the following vulnerability has been resolved:

arm64/sve: Discard stale CPU state when handling SVE traps

The logic for handling SVE traps manipulates saved FPSIMD/SVE state
incorrectly, and a race with preemption can result in a task having
TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SVE traps enabled). This has been observed to result
in warnings from do_sve_acc() where SVE traps are not expected while
TIF_SVE is set:

|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */

Warnings of this form have been reported intermittently, e.g.

  https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/
  https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/

The race can occur when the SVE trap handler is preempted before and
after manipulating the saved FPSIMD/SVE state, starting and ending on
the same CPU, e.g.

| void do_sve_acc(unsigned long esr, struct pt_regs *regs)
| {
|         // Trap on CPU 0 with TIF_SVE clear, SVE traps enabled
|         // task->fpsimd_cpu is 0.
|         // per_cpu_ptr(&fpsimd_last_state, 0) is task.
|
|         ...
|
|         // Preempted; migrated from CPU 0 to CPU 1.
|         // TIF_FOREIGN_FPSTATE is set.
|
|         get_cpu_fpsimd_context();
|
|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */
|
|         sve_init_regs() {
|                 if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
|                         ...
|                 } else {
|                         fpsimd_to_sve(current);
|                         current->thread.fp_type = FP_STATE_SVE;
|                 }
|         }
|
|         put_cpu_fpsimd_context();
|
|         // Preempted; migrated from CPU 1 to CPU 0.
|         // task->fpsimd_cpu is still 0
|         // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then:
|         // - Stale HW state is reused (with SVE traps enabled)
|         // - TIF_FOREIGN_FPSTATE is cleared
|         // - A return to userspace skips HW state restore
| }

Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.

Comment 1 Avinash Hanwate 2024-11-19 04:32:43 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-50275-2e49@gregkh/T

Comment 3 errata-xmlrpc 2025-01-22 02:06:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:0578 https://access.redhat.com/errata/RHSA-2025:0578

Comment 5 errata-xmlrpc 2025-02-05 11:17:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:1067 https://access.redhat.com/errata/RHSA-2025:1067

Comment 6 errata-xmlrpc 2025-02-05 11:34:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:1068 https://access.redhat.com/errata/RHSA-2025:1068

Comment 7 errata-xmlrpc 2025-02-19 00:50:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:1658 https://access.redhat.com/errata/RHSA-2025:1658

Comment 8 errata-xmlrpc 2025-03-10 15:40:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:2525 https://access.redhat.com/errata/RHSA-2025:2525


Note You need to log in before you can comment on or make changes to this bug.