mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
29 lines
1.5 KiB
JSON
29 lines
1.5 KiB
JSON
{
|
|
"id": "CVE-2024-43865",
|
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
"published": "2024-08-21T00:15:04.967",
|
|
"lastModified": "2024-08-21T12:30:33.697",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/fpu: Re-add exception handling in load_fpu_state()\n\nWith the recent rewrite of the fpu code exception handling for the\nlfpc instruction within load_fpu_state() was erroneously removed.\n\nAdd it again to prevent that loading invalid floating point register\nvalues cause an unhandled specification exception."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/fpu: volver a agregar el manejo de excepciones en load_fpu_state() Con la reciente reescritura del c\u00f3digo fpu, el manejo de excepciones para la instrucci\u00f3n lfpc dentro de load_fpu_state() se elimin\u00f3 err\u00f3neamente. Agr\u00e9guelo nuevamente para evitar que la carga de valores de registro de coma flotante no v\u00e1lidos provoque una excepci\u00f3n de especificaci\u00f3n no controlada."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/4734406c39238cbeafe66f0060084caa3247ff53",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/494b14138201f07343e5488db6360c828fcc8cf6",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
}
|
|
]
|
|
} |