|Description||Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1067-1, DSA-1069-1, DSA-1070-1, DSA-1082-1|
|NVD severity||low (attack range: local)|
The information below is based on the following data on fixed versions.
- linux-2.6 <not-affected> (fixed before first upload)