In the Linux kernel, the following vulnerability has been resolved:
x86/srso: Add SRSO mitigation for Hygon processors
Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Jan 2025, 18:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Debian debian Linux Debian Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-787 | |
References | () https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96 - Patch | |
References | () https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d - Patch | |
References | () https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4 - Patch | |
References | () https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d - Patch | |
References | () https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List |
Information
Published : 2024-02-29 06:15
Updated : 2025-01-13 18:27
NVD link : CVE-2023-52482
Mitre link : CVE-2023-52482
CVE.ORG link : CVE-2023-52482
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write