CVE-2024-50193

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50193
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50193.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50193
Downstream
Related
Published
2024-11-08T06:15:16Z
Modified
2025-10-01T21:16:02Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/entry_32: Clear CPU buffers after register restore in NMI return

CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don't have any sensitive data.

Move CLEARCPUBUFFERS after RESTOREALLNMI.

References

Affected packages