Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2025-22013— KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state

EPSS 0.02% · P6

Affected Version Matrix 12

VendorProductVersion RangeStatus
LinuxLinuxc4ab60a86c5ed7c0d727c6dc8cec352e16bc7f90< 5289ac43b69c61a49c75720921f2008005a31c43affected
d5f7d3833b534f9e43e548461dba1e60aa82f587< 04c50cc23a492c4d43fdaefc7c1ecc0ff6f7b82eaffected
93ae6b01bafee8fa385aa25ee7ebdb40057f6abe< 806d5c1e1d2e5502175a24bf70f251648d99c36aaffected
93ae6b01bafee8fa385aa25ee7ebdb40057f6abe< 79e140bba70bcacc5fe15bf8c0b958793fd7d56faffected
93ae6b01bafee8fa385aa25ee7ebdb40057f6abe< 900b444be493b7f404898c785d6605b177a093d0affected
93ae6b01bafee8fa385aa25ee7ebdb40057f6abe< fbc7e61195e23f744814e78524b73b59faa54ab4affected
6.2affected
< 6.2unaffected
… +4 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-22013

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the host's FPSIMD/SVE state, including: * Host SVE being discarded unexpectedly due to inconsistent configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to result in QEMU crashes where SVE is used by memmove(), as reported by Eric Auger: https://issues.redhat.com/browse/RHEL-68997 * Host SVE state is discarded *after* modification by ptrace, which was an unintentional ptrace ABI change introduced with lazy discarding of SVE state. * The host FPMR value can be discarded when running a non-protected VM, where FPMR support is not exposed to a VM, and that VM uses FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR before unbinding the host's FPSIMD/SVE/SME state, leaving a stale value in memory. Avoid these by eagerly saving and "flushing" the host's FPSIMD/SVE/SME state when loading a vCPU such that KVM does not need to save any of the host's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is removed and the necessary call to fpsimd_save_and_flush_cpu_state() is placed in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr' should not be used, they are set to NULL; all uses of these will be removed in subsequent patches. Historical problems go back at least as far as v5.17, e.g. erroneous assumptions about TIF_SVE being clear in commit: 8383741ab2e773a9 ("KVM: arm64: Get rid of host SVE tracking/saving") ... and so this eager save+flush probably needs to be backported to ALL stable trees.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未正确保存主机FPSIMD/SVE/SME状态,可能导致QEMU崩溃或ptrace ABI变更。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux c4ab60a86c5ed7c0d727c6dc8cec352e16bc7f90 ~ 5289ac43b69c61a49c75720921f2008005a31c43 -
LinuxLinux 6.2 -

II. Public POCs for CVE-2025-22013

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-22013

登录查看更多情报信息。
Patch · 2

Same Patch Batch · Linux · 2025-04-08 · 10 CVEs total

CVE-2025-22017devlink: fix xa_alloc_cyclic() error handling
CVE-2025-22016dpll: fix xa_alloc_cyclic() error handling
CVE-2025-22015mm/migrate: fix shmem xarray update during migration
CVE-2025-22014soc: qcom: pdr: Fix the potential deadlock
CVE-2025-22012Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu"
CVE-2025-22011ARM: dts: bcm2711: Fix xHCI power-domain
CVE-2025-22010RDMA/hns: Fix soft lockup during bt pages loop
CVE-2025-22009regulator: dummy: force synchronous probing
CVE-2025-22008regulator: check that dummy regulator has been probed before using it

IV. Related Vulnerabilities

V. Comments for CVE-2025-22013

No comments yet


Leave a comment