CVE-2024-43865

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43865
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43865.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-43865
Downstream
Published
2024-08-20T23:50:48Z
Modified
2025-10-22T01:24:18.721600Z
Summary
s390/fpu: Re-add exception handling in load_fpu_state()
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/fpu: Re-add exception handling in loadfpustate()

With the recent rewrite of the fpu code exception handling for the lfpc instruction within loadfpustate() was erroneously removed.

Add it again to prevent that loading invalid floating point register values cause an unhandled specification exception.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c09871a950a3fe686e0e27fd4193179c5f74f37
Fixed
494b14138201f07343e5488db6360c828fcc8cf6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c09871a950a3fe686e0e27fd4193179c5f74f37
Fixed
4734406c39238cbeafe66f0060084caa3247ff53

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.10.1
v6.10.2
v6.10.3
v6.11-rc1
v6.8
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.10.4