Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-34320

Опубликовано: 08 дек. 2023
Источник: debian
EPSS Низкий

Описание

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.17.2-1package
xenfixed4.17.2+76-ge1f9cb16e2-1~deb12u1bookwormpackage
xenend-of-lifebullseyepackage
xenend-of-lifebusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2023/08/01/1

  • https://xenbits.xen.org/xsa/advisory-436.html

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 2 лет назад

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.

CVSS3: 5.5
nvd
около 2 лет назад

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.

CVSS3: 5.5
github
около 2 лет назад

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.

EPSS

Процентиль: 21%
0.00067
Низкий