First published: Thu Dec 05 2019(Updated: )
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <5.4.2 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
Linux Kernel | <5.4.2 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-19602.
The severity of CVE-2019-19602 is not specified.
The affected software for CVE-2019-19602 includes Linux kernel versions before 5.4.2 when GCC 9 is used.
This vulnerability can be exploited by context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact due to incorrect fpu_fpregs_owner_ctx caching.
To fix the vulnerability CVE-2019-19602, you should update your Linux kernel to version 5.5 or later.