目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2025-22013— Linux kernel 安全漏洞

EPSS 0.06% · P19
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2025-22013の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
ソース: NVD (National Vulnerability Database)
脆弱性説明
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the host's FPSIMD/SVE state, including: * Host SVE being discarded unexpectedly due to inconsistent configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to result in QEMU crashes where SVE is used by memmove(), as reported by Eric Auger: https://issues.redhat.com/browse/RHEL-68997 * Host SVE state is discarded *after* modification by ptrace, which was an unintentional ptrace ABI change introduced with lazy discarding of SVE state. * The host FPMR value can be discarded when running a non-protected VM, where FPMR support is not exposed to a VM, and that VM uses FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR before unbinding the host's FPSIMD/SVE/SME state, leaving a stale value in memory. Avoid these by eagerly saving and "flushing" the host's FPSIMD/SVE/SME state when loading a vCPU such that KVM does not need to save any of the host's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is removed and the necessary call to fpsimd_save_and_flush_cpu_state() is placed in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr' should not be used, they are set to NULL; all uses of these will be removed in subsequent patches. Historical problems go back at least as far as v5.17, e.g. erroneous assumptions about TIF_SVE being clear in commit: 8383741ab2e773a9 ("KVM: arm64: Get rid of host SVE tracking/saving") ... and so this eager save+flush probably needs to be backported to ALL stable trees.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未正确保存主机FPSIMD/SVE/SME状态,可能导致QEMU崩溃或ptrace ABI变更。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
LinuxLinux c4ab60a86c5ed7c0d727c6dc8cec352e16bc7f90 ~ 5289ac43b69c61a49c75720921f2008005a31c43 -
LinuxLinux 6.2 -

II. CVE-2025-22013の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2025-22013のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-04-08 · 10 CVEs total

CVE-2025-22017devlink: fix xa_alloc_cyclic() error handling
CVE-2025-22016dpll: fix xa_alloc_cyclic() error handling
CVE-2025-22015mm/migrate: fix shmem xarray update during migration
CVE-2025-22014soc: qcom: pdr: Fix the potential deadlock
CVE-2025-22012Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu"
CVE-2025-22011ARM: dts: bcm2711: Fix xHCI power-domain
CVE-2025-22010RDMA/hns: Fix soft lockup during bt pages loop
CVE-2025-22009regulator: dummy: force synchronous probing
CVE-2025-22008regulator: check that dummy regulator has been probed before using it

IV. 関連脆弱性

V. CVE-2025-22013へのコメント

まだコメントはありません


コメントを残す