{"uuid": "11751a5f-0eda-4745-ade7-99cb4760fd66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50193", "type": "seen", "source": "https://t.me/cvedetector/10172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50193 - Intel CPU Buffer Cleardown Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50193 \nPublished : Nov. 8, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nx86/entry_32: Clear CPU buffers after register restore in NMI return  \n  \nCPU buffers are currently cleared after call to exc_nmi, but before  \nregister state is restored. This may be okay for MDS mitigation but not for  \nRDFS. Because RDFS mitigation requires CPU buffers to be cleared when  \nregisters don't have any sensitive data.  \n  \nMove CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T07:59:47.000000Z"}