{"id":"CVE-2024-50072","summary":"x86/bugs: Use code segment selector for VERW operand","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/bugs: Use code segment selector for VERW operand\n\nRobert Gill reported below #GP in 32-bit mode when dosemu software was\nexecuting vm86() system call:\n\n  general protection fault: 0000 [#1] PREEMPT SMP\n  CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1\n  Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010\n  EIP: restore_all_switch_stack+0xbe/0xcf\n  EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000\n  ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc\n  DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046\n  CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0\n  Call Trace:\n   show_regs+0x70/0x78\n   die_addr+0x29/0x70\n   exc_general_protection+0x13c/0x348\n   exc_bounds+0x98/0x98\n   handle_exception+0x14d/0x14d\n   exc_bounds+0x98/0x98\n   restore_all_switch_stack+0xbe/0xcf\n   exc_bounds+0x98/0x98\n   restore_all_switch_stack+0xbe/0xcf\n\nThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS\nare enabled. This is because segment registers with an arbitrary user value\ncan result in #GP when executing VERW. Intel SDM vol. 2C documents the\nfollowing behavior for VERW instruction:\n\n  #GP(0) - If a memory operand effective address is outside the CS, DS, ES,\n\t   FS, or GS segment limit.\n\nCLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user\nspace. Use %cs selector to reference VERW operand. This ensures VERW will\nnot #GP for an arbitrary user %ds.\n\n[ mingo: Fixed the SOB chain. ]","modified":"2026-04-02T12:21:15.569523Z","published":"2024-10-29T00:50:14.170Z","related":["USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50072.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/38c5fe74f3bef98f75d16effa49836d50c9b6097"},{"type":"WEB","url":"https://git.kernel.org/stable/c/481b477ab63c7245715a3e57ba79eb87c2dc0d02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ada431c6c31a2c8c37991c46089af5caa23a9c6e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc576fbaf82deded606e69a00efe9752136bf91d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bfd1d223d80cb29a210caa1bd5e21f0816d58f02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4d2102018542e3ae5e297bc6e229303abff8a0f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50072.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50072"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"50f021f0b985629accf10481a6e89af8b9700583"},{"fixed":"bfd1d223d80cb29a210caa1bd5e21f0816d58f02"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d54de9f2a127090f2017184e8257795b487d5312"},{"fixed":"ada431c6c31a2c8c37991c46089af5caa23a9c6e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2e3087505ddb8ba2d3d4c81306cca11e868fcdb9"},{"fixed":"38c5fe74f3bef98f75d16effa49836d50c9b6097"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ca13d8cd8dac25558da4ee8df4dc70e8e7f9d762"},{"fixed":"481b477ab63c7245715a3e57ba79eb87c2dc0d02"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a0e2dab44d22b913b4c228c8b52b2a104434b0b3"},{"fixed":"bc576fbaf82deded606e69a00efe9752136bf91d"},{"fixed":"e4d2102018542e3ae5e297bc6e229303abff8a0f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"51eca9f1fd047b500137d021f882d93f03280118"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50072.json"}}],"schema_version":"1.7.5"}