arm:访客可以触发 Cortex-A77 上的死锁 (CVE-2023-34320)
CVE编号
CVE-2023-34320利用情况
暂无补丁情况
N/A披露时间
2023-12-09漏洞描述
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://xenbits.xenproject.org/xsa/advisory-436.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | alpine_3.15 | xen | * | Up to (excluding) 4.15.4-r3 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | xen | * | Up to (excluding) 4.16.4-r3 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | xen | * | Up to (excluding) 4.16.4-r3 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | xen | * | Up to (excluding) 4.17.1-r4 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.19 | xen | * | Up to (excluding) 4.17.1-r5 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | xen | * | Up to (excluding) 4.17.1-r5 | |||||
运行在以下环境 | |||||||||
系统 | arm | cortex-a77_firmware | r0p0 | - | |||||
运行在以下环境 | |||||||||
系统 | arm | cortex-a77_firmware | r1p0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | xen | * | Up to (including) 4.11.4+107-gef32c7afa2-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | xen | * | Up to (including) 4.14.6-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | xen | * | Up to (excluding) 4.17.2+76-ge1f9cb16e2-1~deb12u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | xen | * | Up to (excluding) 4.17.2-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | xen-libs | * | Up to (excluding) 4.16.5-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | xen-libs | * | Up to (excluding) 4.17.1-9.fc38 | |||||
运行在以下环境 | |||||||||
系统 | xen | xen | * | - | |||||
运行在以下环境 | |||||||||
硬件 | arm | cortex-a77 | - | - | |||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-667 | 加锁机制不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论