Fixed                
                
            
            
                
                    Created: Mar 2, 2024   
                                            Updated: Apr 15, 2024                                    
                
                    
                                    
             
         
        
            
            
                                    
                        Resolved Date: Apr 15, 2024                    
                
                
                                    
                        Found In Version: 10.19.45.1                    
                
                
                                        
                            Severity: Standard                        
                    
                                        
                            Applicable for: Wind River Linux LTS 19                        
                    
                                    
                        Component/s: Kernel                    
                
                
                             
         
                        
                In the Linux kernel, the following vulnerability has been resolved:
x86/reboot: VMCLEAR active VMCSes before emergency reboot
VMCLEAR active VMCSes before any emergency reboot, not just if the kernel
may kexec into a new kernel after a crash.  Per Intel's SDM, the VMX
architecture doesn't require the CPU to flush the VMCS cache on INIT.  If
an emergency reboot doesn't RESET CPUs, cached VMCSes could theoretically
be kept and only be written back to memory after the new kernel is booted,
i.e. could effectively corrupt memory after reboot.
Opportunistically remove the setting of the global pointer to NULL to make
checkpatch happy.
CREATE(Triage):(User=admin) CVE-2023-52514 (https://nvd.nist.gov/vuln/detail/CVE-2023-52514)