28 lines
1.4 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-52514",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:47.777",
"lastModified": "2024-03-04T13:58:23.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/reboot: VMCLEAR active VMCSes before emergency reboot\n\nVMCLEAR active VMCSes before any emergency reboot, not just if the kernel\nmay kexec into a new kernel after a crash. Per Intel's SDM, the VMX\narchitecture doesn't require the CPU to flush the VMCS cache on INIT. If\nan emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically\nbe kept and only be written back to memory after the new kernel is booted,\ni.e. could effectively corrupt memory after reboot.\n\nOpportunistically remove the setting of the global pointer to NULL to make\ncheckpatch happy."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}