Количество 5
Количество 5
CVE-2023-52990
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-52990
[REJECTED CVE] A vulnerability was initially suspected in the Linux kernel's s390 architecture code due to a misleading out-of-bounds read warning generated by GCC 11.1/11.2. However, this was a false positive caused by compiler misinterpretation of memcpy() usage in performance-critical lowcore operations. No actual memory corruption or security risk was present. An attacker could not exploit this issue, as the underlying code behavior remained safe and correct; the fix simply replaced memcpy() with a loop to silence the erroneous warning.
CVE-2023-52990
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-c7qr-fxvv-x4fh
In the Linux kernel, the following vulnerability has been resolved: s390: workaround invalid gcc-11 out of bounds read warning GCC 11.1.0 and 11.2.0 generate a wrong warning when compiling the kernel e.g. with allmodconfig: arch/s390/kernel/setup.c: In function ‘setup_lowcore_dat_on’: ./include/linux/fortify-string.h:57:33: error: ‘__builtin_memcpy’ reading 128 bytes from a region of size 0 [-Werror=stringop-overread] ... arch/s390/kernel/setup.c:526:9: note: in expansion of macro ‘memcpy’ 526 | memcpy(abs_lc->cregs_save_area, S390_lowcore.cregs_save_area, | ^~~~~~ This could be addressed by using absolute_pointer() with the S390_lowcore macro, but this is not a good idea since this generates worse code for performance critical paths. Therefore simply use a for loop to copy the array in question and get rid of the warning.
BDU:2025-14102
Уязвимость компонента s390 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-52990 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 11 месяцев назад | |||
CVE-2023-52990 [REJECTED CVE] A vulnerability was initially suspected in the Linux kernel's s390 architecture code due to a misleading out-of-bounds read warning generated by GCC 11.1/11.2. However, this was a false positive caused by compiler misinterpretation of memcpy() usage in performance-critical lowcore operations. No actual memory corruption or security risk was present. An attacker could not exploit this issue, as the underlying code behavior remained safe and correct; the fix simply replaced memcpy() with a loop to silence the erroneous warning. | CVSS3: 5.5 | 11 месяцев назад | ||
CVE-2023-52990 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 11 месяцев назад | |||
GHSA-c7qr-fxvv-x4fh In the Linux kernel, the following vulnerability has been resolved: s390: workaround invalid gcc-11 out of bounds read warning GCC 11.1.0 and 11.2.0 generate a wrong warning when compiling the kernel e.g. with allmodconfig: arch/s390/kernel/setup.c: In function ‘setup_lowcore_dat_on’: ./include/linux/fortify-string.h:57:33: error: ‘__builtin_memcpy’ reading 128 bytes from a region of size 0 [-Werror=stringop-overread] ... arch/s390/kernel/setup.c:526:9: note: in expansion of macro ‘memcpy’ 526 | memcpy(abs_lc->cregs_save_area, S390_lowcore.cregs_save_area, | ^~~~~~ This could be addressed by using absolute_pointer() with the S390_lowcore macro, but this is not a good idea since this generates worse code for performance critical paths. Therefore simply use a for loop to copy the array in question and get rid of the warning. | 11 месяцев назад | |||
BDU:2025-14102 Уязвимость компонента s390 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 11 месяцев назад |
Уязвимостей на страницу