Description
In the Linux kernel, the following vulnerability has been resolved: arm64: mops: Do not dereference src reg for a set operation The source register is not used for SET* and reading it can result in a UBSAN out-of-bounds array access error, specifically when the MOPS exception is taken from a SET* sequence with XZR (reg 31) as the source. Architecturally this is the only case where a src/dst/size field in the ESR can be reported as 31. Prior to 2de451a329cf662b the code in do_el0_mops() was benign as the use of pt_regs_read_reg() prevented the out-of-bounds access.
References (4)
Core 4
Core References
Scores
CVSS v3
7.1
EPSS
0.0007
EPSS Percentile
20.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
linux/Kernel
6.13.0 - 6.13.12linux
linux/Kernel
6.14.0 - 6.14.3linux
linux/Kernel
6.7.0 - 6.12.24linux
linux/linux_kernel
6.7 - 6.12.24
Published
May 09, 2025
Tracked Since
Feb 18, 2026