CVE-2023-52598

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
06/03/2024
Last modified:
14/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/ptrace: handle setting of fpc register correctly<br /> <br /> If the content of the floating point control (fpc) register of a traced<br /> process is modified with the ptrace interface the new value is tested for<br /> validity by temporarily loading it into the fpc register.<br /> <br /> This may lead to corruption of the fpc register of the tracing process:<br /> if an interrupt happens while the value is temporarily loaded into the<br /> fpc register, and within interrupt context floating point or vector<br /> registers are used, the current fp/vx registers are saved with<br /> save_fpu_regs() assuming they belong to user space and will be loaded into<br /> fp/vx registers when returning to user space.<br /> <br /> test_fp_ctl() restores the original user space fpc register value, however<br /> it will be discarded, when returning to user space.<br /> <br /> In result the tracer will incorrectly continue to run with the value that<br /> was supposed to be used for the traced process.<br /> <br /> Fix this by saving fpu register contents with save_fpu_regs() before using<br /> test_fp_ctl().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.307 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.269 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.210 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.77 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.4 (excluding)