Bug 2355477 (CVE-2023-52990) - CVE-2023-52990 kernel: s390: workaround invalid gcc-11 out of bounds read warning
Summary: CVE-2023-52990 kernel: s390: workaround invalid gcc-11 out of bounds read war...
Keywords:
Status: NEW
Alias: CVE-2023-52990
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-27 17:03 UTC by OSIDB Bzimport
Modified: 2025-10-23 12:47 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-27 17:03:23 UTC
In the Linux kernel, the following vulnerability has been resolved:

s390: workaround invalid gcc-11 out of bounds read warning

GCC 11.1.0 and 11.2.0 generate a wrong warning when compiling the
kernel e.g. with allmodconfig:

arch/s390/kernel/setup.c: In function ‘setup_lowcore_dat_on’:
./include/linux/fortify-string.h:57:33: error: ‘__builtin_memcpy’ reading 128 bytes from a region of size 0 [-Werror=stringop-overread]
...
arch/s390/kernel/setup.c:526:9: note: in expansion of macro ‘memcpy’
  526 |         memcpy(abs_lc->cregs_save_area, S390_lowcore.cregs_save_area,
      |         ^~~~~~

This could be addressed by using absolute_pointer() with the
S390_lowcore macro, but this is not a good idea since this generates
worse code for performance critical paths.

Therefore simply use a for loop to copy the array in question and get
rid of the warning.

Comment 3 TEJ RATHI 2025-05-15 08:07:18 UTC
This CVE has been rejected upstream: https://lore.kernel.org/linux-cve-announce/2025040115-REJECTED-4ce0@gregkh/


Note You need to log in before you can comment on or make changes to this bug.