CVE-2023-1637

A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*

History

21 Nov 2024, 07:39

Type Values Removed Values Added
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 - Mailing List, Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 - Mailing List, Patch
References () https://sourceware.org/bugzilla/show_bug.cgi?id=27398 - Issue Tracking () https://sourceware.org/bugzilla/show_bug.cgi?id=27398 - Issue Tracking

Information

Published : 2023-03-27 22:15

Updated : 2024-11-21 07:39


NVD link : CVE-2023-1637

Mitre link : CVE-2023-1637

CVE.ORG link : CVE-2023-1637


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-226

Sensitive Information in Resource Not Removed Before Reuse

CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer