### [CVE-2024-50193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50193) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2e3087505ddb8ba2d3d4c81306cca11e868fcdb9%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=50f021f0b985629accf10481a6e89af8b9700583%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=51eca9f1fd047b500137d021f882d93f03280118%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=a0e2dab44d22b913b4c228c8b52b2a104434b0b3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ca13d8cd8dac25558da4ee8df4dc70e8e7f9d762%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=d54de9f2a127090f2017184e8257795b487d5312%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:x86/entry_32: Clear CPU buffers after register restore in NMI returnCPU buffers are currently cleared after call to exc_nmi, but beforeregister state is restored. This may be okay for MDS mitigation but not forRDFS. Because RDFS mitigation requires CPU buffers to be cleared whenregisters don't have any sensitive data.Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security