CVE-2024-50193

In the Linux kernel, the following vulnerability has been resolved: x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don't have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*

History

29 Nov 2024, 19:29

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/227358e89703c344008119be7e8ffa3fdb5b92de - () https://git.kernel.org/stable/c/227358e89703c344008119be7e8ffa3fdb5b92de - Patch
References () https://git.kernel.org/stable/c/43778de19d2ef129636815274644b9c16e78c66b - () https://git.kernel.org/stable/c/43778de19d2ef129636815274644b9c16e78c66b - Patch
References () https://git.kernel.org/stable/c/48a2440d0f20c826b884e04377ccc1e4696c84e9 - () https://git.kernel.org/stable/c/48a2440d0f20c826b884e04377ccc1e4696c84e9 - Patch
References () https://git.kernel.org/stable/c/64adf22c4bc73ede920baca5defefb70f190cdbc - () https://git.kernel.org/stable/c/64adf22c4bc73ede920baca5defefb70f190cdbc - Patch
References () https://git.kernel.org/stable/c/6f44a5fc15b5cece0785bc07453db77d99b0a6de - () https://git.kernel.org/stable/c/6f44a5fc15b5cece0785bc07453db77d99b0a6de - Patch
References () https://git.kernel.org/stable/c/b6400eb0b347821efc57760221f8fb6d63b9548a - () https://git.kernel.org/stable/c/b6400eb0b347821efc57760221f8fb6d63b9548a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

08 Nov 2024, 19:01

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/entry_32: Borrar los búferes de la CPU después de restaurar el registro en el retorno NMI Los búferes de la CPU se borran actualmente después de la llamada a exc_nmi, pero antes de que se restaure el estado del registro. Esto puede ser adecuado para la mitigación de MDS, pero no para RDFS. Porque la mitigación de RDFS requiere que se borren los búferes de la CPU cuando los registros no tienen datos confidenciales. Mueva CLEAR_CPU_BUFFERS después de RESTORE_ALL_NMI.

08 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-08 06:15

Updated : 2024-11-29 19:29


NVD link : CVE-2024-50193

Mitre link : CVE-2024-50193

CVE.ORG link : CVE-2024-50193


JSON object : View

Products Affected

linux

  • linux_kernel