CVE-2023-34320
MEDIUM
5,5
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under certain circumstances, could deadlock a core
due to the execution of either a load to device or non-cacheable memory,
and either a store exclusive or register read of the Physical
Address Register (PAR_EL1) in close proximity.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0011
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
667
Improper Locking
DraftCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Cpu)
Applicable Platforms
All platforms may be affected
Operating System
Cortex-A77 Firmware by Arm
CPE Identifier
View Detailed Analysis
cpe:2.3:o:arm:cortex-a77_firmware:r1p0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Xen by Xen
CPE Identifier
View Detailed Analysis
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Cortex-A77 Firmware by Arm
CPE Identifier
View Detailed Analysis
cpe:2.3:o:arm:cortex-a77_firmware:r0p0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://xenbits.xenproject.org/xsa/advisory-436.html
http://xenbits.xen.org/xsa/advisory-436.html
https://xenbits.xenproject.org/xsa/advisory-436.html