{"id":"CVE-2024-38667","summary":"riscv: prevent pt_regs corruption for secondary idle threads","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: prevent pt_regs corruption for secondary idle threads\n\nTop of the kernel thread stack should be reserved for pt_regs. However\nthis is not the case for the idle threads of the secondary boot harts.\nTheir stacks overlap with their pt_regs, so both may get corrupted.\n\nSimilar issue has been fixed for the primary hart, see c7cdd96eca28\n(\"riscv: prevent stack corruption by reserving task_pt_regs(p) early\").\nHowever that fix was not propagated to the secondary harts. The problem\nhas been noticed in some CPU hotplug tests with V enabled. The function\nsmp_callin stored several registers on stack, corrupting top of pt_regs\nstructure including status field. As a result, kernel attempted to save\nor restore inexistent V context.","modified":"2026-04-02T12:16:57.204610Z","published":"2024-06-24T13:52:25.399Z","related":["MGASA-2024-0263","MGASA-2024-0266"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38667.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38667.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38667"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2875fe0561569f82d0e63658ccf0d11ce7da8922"},{"fixed":"ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e"},{"fixed":"3090c06d50eaa91317f84bf3eac4c265e6cb8d44"},{"fixed":"0c1f28c32a194303da630fca89481334b9547b80"},{"fixed":"a638b0461b58aa3205cd9d5f14d6f703d795b4af"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38667.json"}}],"schema_version":"1.7.5"}