In the Linux kernel, the following vulnerability has been resolved:
x86/entry_32: Clear CPU buffers after register restore in NMI return
CPU buffers are currently cleared after call to exc_nmi, but before
register state is restored. This may be okay for MDS mitigation but not for
RDFS. Because RDFS mitigation requires CPU buffers to be cleared when
registers don't have any sensitive data.
Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.
References
Configurations
Configuration 1 (hide)
|
History
29 Nov 2024, 19:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/227358e89703c344008119be7e8ffa3fdb5b92de - Patch | |
References | () https://git.kernel.org/stable/c/43778de19d2ef129636815274644b9c16e78c66b - Patch | |
References | () https://git.kernel.org/stable/c/48a2440d0f20c826b884e04377ccc1e4696c84e9 - Patch | |
References | () https://git.kernel.org/stable/c/64adf22c4bc73ede920baca5defefb70f190cdbc - Patch | |
References | () https://git.kernel.org/stable/c/6f44a5fc15b5cece0785bc07453db77d99b0a6de - Patch | |
References | () https://git.kernel.org/stable/c/b6400eb0b347821efc57760221f8fb6d63b9548a - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
08 Nov 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-08 06:15
Updated : 2024-11-29 19:29
NVD link : CVE-2024-50193
Mitre link : CVE-2024-50193
CVE.ORG link : CVE-2024-50193
JSON object : View
Products Affected
linux
- linux_kernel
CWE