发布时间: 2024年11月22日
修改时间: 2024年11月22日
In the Linux kernel, the following vulnerability has been resolved: x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don't have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.
NVD | openEuler | |
---|---|---|
Confidentiality | High | Low |
Attack Vector | Local | Local |
CVSS评分 | 7.1 | 3.9 |
Attack Complexity | Low | High |
Privileges Required | Low | High |
Scope | Unchanged | Unchanged |
Integrity | None | Low |
User Interaction | None | None |
Availability | High | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4991 | kernel security update | 2025年8月15日 |
产品 | 包 | 状态 |
---|---|---|
V6 | kernel | Fixed |