Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-53713— arm64: sme: Use STR P to clear FFR context field in streaming SVE mode

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53713

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
arm64: sme: Use STR P to clear FFR context field in streaming SVE mode
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: arm64: sme: Use STR P to clear FFR context field in streaming SVE mode The FFR is a predicate register which can vary between 16 and 256 bits in size depending upon the configured vector length. When saving the SVE state in streaming SVE mode, the FFR register is inaccessible and so commit 9f5848665788 ("arm64/sve: Make access to FFR optional") simply clears the FFR field of the in-memory context structure. Unfortunately, it achieves this using an unconditional 8-byte store and so if the SME vector length is anything other than 64 bytes in size we will either fail to clear the entire field or, worse, we will corrupt memory immediately following the structure. This has led to intermittent kfence splats in CI [1] and can trigger kmalloc Redzone corruption messages when running the 'fp-stress' kselftest: | ============================================================================= | BUG kmalloc-1k (Not tainted): kmalloc Redzone overwritten | ----------------------------------------------------------------------------- | | 0xffff000809bf1e22-0xffff000809bf1e27 @offset=7714. First byte 0x0 instead of 0xcc | Allocated in do_sme_acc+0x9c/0x220 age=2613 cpu=1 pid=531 | __kmalloc+0x8c/0xcc | do_sme_acc+0x9c/0x220 | ... Replace the 8-byte store with a store of a predicate register which has been zero-initialised with PFALSE, ensuring that the entire field is cleared in memory. [1] https://lore.kernel.org/r/CA+G9fYtU7HsV0R0dp4XEH5xXHSJFw8KyDf5VQrLLfMxWfxQkag@mail.gmail.com
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在流式SVE模式下使用不当存储指令清除FFR上下文字段,可能导致内存损坏。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 9f5848665788a0f07bc175cb2cdd06d367b7556e ~ 97669214944e80d3756657c21c4f286f3da6a423 -
LinuxLinux 5.16 -

II. Public POCs for CVE-2023-53713

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53713

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-10-22 · 67 CVEs total

CVE-2023-53709ring-buffer: Handle race between rb_move_tail and rb_check_pages
CVE-2023-53729soc: qcom: qmi_encdec: Restrict string length in decode
CVE-2023-53727net/sched: fq_pie: avoid stalls in fq_pie_timer()
CVE-2023-53728posix-timers: Ensure timer ID search-loop limit is valid
CVE-2023-53717wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()
CVE-2023-53715wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex
CVE-2023-53714drm/stm: ltdc: fix late dereference check
CVE-2023-53712ARM: 9317/1: kexec: Make smp stop calls asynchronous
CVE-2023-53711NFS: Fix a potential data corruption
CVE-2023-53710wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read
CVE-2023-53716net: fix skb leak in __skb_tstamp_tx()
CVE-2023-53707drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
CVE-2023-53708ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
CVE-2023-53705ipv6: Fix out-of-bounds access in ipv6_find_tlv()
CVE-2023-53706mm/vmemmap/devdax: fix kernel crash when probing devdax devices
CVE-2023-53704clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()
CVE-2023-53702s390/crypto: use vector instructions only if available for ChaCha20
CVE-2023-53703HID: amd_sfh: Fix for shift-out-of-bounds
CVE-2023-53700media: max9286: Fix memleak in max9286_v4l2_register()
CVE-2023-53699riscv: move memblock_allow_resize() after linear mapping is ready

Showing top 20 of 67 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53713

No comments yet


Leave a comment