2024-08-21 14:03:17 +00:00

29 lines
1.5 KiB
JSON

{
"id": "CVE-2024-43865",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T00:15:04.967",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/fpu: Re-add exception handling in load_fpu_state()\n\nWith the recent rewrite of the fpu code exception handling for the\nlfpc instruction within load_fpu_state() was erroneously removed.\n\nAdd it again to prevent that loading invalid floating point register\nvalues cause an unhandled specification exception."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/fpu: volver a agregar el manejo de excepciones en load_fpu_state() Con la reciente reescritura del c\u00f3digo fpu, el manejo de excepciones para la instrucci\u00f3n lfpc dentro de load_fpu_state() se elimin\u00f3 err\u00f3neamente. Agr\u00e9guelo nuevamente para evitar que la carga de valores de registro de coma flotante no v\u00e1lidos provoque una excepci\u00f3n de especificaci\u00f3n no controlada."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4734406c39238cbeafe66f0060084caa3247ff53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/494b14138201f07343e5488db6360c828fcc8cf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}