CVE-2023-52481
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/02/2024
Last modified:
04/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arm64: errata: Add Cortex-A520 speculative unprivileged load workaround<br />
<br />
Implement the workaround for ARM Cortex-A520 erratum 2966298. On an<br />
affected Cortex-A520 core, a speculatively executed unprivileged load<br />
might leak data from a privileged load via a cache side channel. The<br />
issue only exists for loads within a translation regime with the same<br />
translation (e.g. same ASID and VMID). Therefore, the issue only affects<br />
the return to EL0.<br />
<br />
The workaround is to execute a TLBI before returning to EL0 after all<br />
loads of privileged data. A non-shareable TLBI to any address is<br />
sufficient.<br />
<br />
The workaround isn&#39;t necessary if page table isolation (KPTI) is<br />
enabled, but for simplicity it will be. Page table isolation should<br />
normally be disabled for Cortex-A520 as it supports the CSV3 feature<br />
and the E0PD feature (used when KASLR is enabled).
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.57 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25
- https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513
- https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c
- https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25
- https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513
- https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c



