Impact
In the ARM64 Linux kernel, a defect in the ptrace handling for the NT_ARM_SVE register set can leave a task’s TIF_SVE flag unset when SVE is supported but SME is not. This omission causes the kernel to log a benign warning during a later state restore, but it does not alter process execution, confidentiality, or integrity. The bug was introduced during a refactor that moved the TIF_SVE assignment inside a SME‑only code block.
Affected Systems
The vulnerability is confined to ARM64 kernels that compile with CONFIG_ARM64_SVE enabled while CONFIG_ARM64_SME is disabled. It appears in the 6.19 release candidate series (rc1 through rc6) and any downstream kernels that incorporate those revisions. Only processes that have ptrace access to the NT_ARM_SVE register set are affected.
Risk and Exploitability
The CVSS score of 5.5 and an EPSS below 1 % indicate a moderate severity and very low likelihood of exploitation as of the latest data. The issue is not present in the CISA KEV catalog. An attacker would need the ability to perform ptrace on a target process, typically local privileged access or the same user running two processes. Since the only observable effect is a kernel warning, the risk to confidentiality, integrity, or availability is negligible.
OpenCVE Enrichment