CVE-2023-52481

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/02/2024
Last modified:
04/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> arm64: errata: Add Cortex-A520 speculative unprivileged load workaround<br /> <br /> Implement the workaround for ARM Cortex-A520 erratum 2966298. On an<br /> affected Cortex-A520 core, a speculatively executed unprivileged load<br /> might leak data from a privileged load via a cache side channel. The<br /> issue only exists for loads within a translation regime with the same<br /> translation (e.g. same ASID and VMID). Therefore, the issue only affects<br /> the return to EL0.<br /> <br /> The workaround is to execute a TLBI before returning to EL0 after all<br /> loads of privileged data. A non-shareable TLBI to any address is<br /> sufficient.<br /> <br /> The workaround isn&amp;#39;t necessary if page table isolation (KPTI) is<br /> enabled, but for simplicity it will be. Page table isolation should<br /> normally be disabled for Cortex-A520 as it supports the CSV3 feature<br /> and the E0PD feature (used when KASLR is enabled).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.57 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*