Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1067-1 | New Linux kernel 2.4.16 packages fix several vulnerabilities |
Debian DSA |
DSA-1069-1 | New Linux kernel 2.4.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1070-1 | New Linux kernel 2.4.19 packages fix several vulnerabilities |
Debian DSA |
DSA-1082-1 | New Linux kernel 2.4.17 packages fix several vulnerabilities |
EUVD |
EUVD-2004-0564 | Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:24:25.856Z
Reserved: 2004-06-15T00:00:00
Link: CVE-2004-0565
No data.
Status : Deferred
Published: 2004-12-06T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0565
OpenCVE Enrichment
No data.
Debian DSA
EUVD