fpregsstatevalid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpufpregsowner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19602.json"
[
{
"digest": {
"line_hashes": [
"88830588198180861881487795944025245383",
"52463841137351386819149595448761905008",
"17794339980534270915800847297333763441",
"230223046563062130638441865186170474526"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "arch/x86/include/asm/fpu/internal.h"
},
"signature_type": "Line",
"id": "CVE-2019-19602-73bbc0e0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@59c4bd853abcea95eccc167a7d7fd5f1a5f47b98",
"deprecated": false
}
]