Логотип exploitDog
bind:CVE-2023-52514
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-52514

Количество 3

Количество 3

redhat логотип

CVE-2023-52514

почти 2 года назад

A flaw was found in the Linux Kernel's x86/reboot: VMCLEAR active VMCSes before emergency reboot.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2023-52514

почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-766r-w9pc-fw69

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: x86/reboot: VMCLEAR active VMCSes before emergency reboot VMCLEAR active VMCSes before any emergency reboot, not just if the kernel may kexec into a new kernel after a crash. Per Intel's SDM, the VMX architecture doesn't require the CPU to flush the VMCS cache on INIT. If an emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically be kept and only be written back to memory after the new kernel is booted, i.e. could effectively corrupt memory after reboot. Opportunistically remove the setting of the global pointer to NULL to make checkpatch happy.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-52514

A flaw was found in the Linux Kernel's x86/reboot: VMCLEAR active VMCSes before emergency reboot.

CVSS3: 5.5
почти 2 года назад
nvd логотип
CVE-2023-52514

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

почти 2 года назад
github логотип
GHSA-766r-w9pc-fw69

In the Linux kernel, the following vulnerability has been resolved: x86/reboot: VMCLEAR active VMCSes before emergency reboot VMCLEAR active VMCSes before any emergency reboot, not just if the kernel may kexec into a new kernel after a crash. Per Intel's SDM, the VMX architecture doesn't require the CPU to flush the VMCS cache on INIT. If an emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically be kept and only be written back to memory after the new kernel is booted, i.e. could effectively corrupt memory after reboot. Opportunistically remove the setting of the global pointer to NULL to make checkpatch happy.

почти 2 года назад

Уязвимостей на страницу