Refine your search
2 vulnerabilities found for cortex-a77_firmware by arm
CVE-2023-34320 (GCVE-0-2023-34320)
Vulnerability from nvd
Published
2023-12-08 20:54
Modified
2025-11-04 19:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under certain circumstances, could deadlock a core
due to the execution of either a load to device or non-cacheable memory,
and either a store exclusive or register read of the Physical
Address Register (PAR_EL1) in close proximity.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:16:33.356Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-436.html"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-436.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-436"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Systems running all version of Xen are affected.\n\nThis bug is specific to Arm Cortex-A77 cores r0p0 and r1p0.\n"
}
],
"datePublic": "2023-08-01T14:44:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412\nwhere software, under certain circumstances, could deadlock a core\ndue to the execution of either a load to device or non-cacheable memory,\nand either a store exclusive or register read of the Physical\nAddress Register (PAR_EL1) in close proximity.\n"
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "A (malicious) guest that doesn\u0027t include the workaround for erratum\n1508412 could deadlock the core. This will ultimately result to\na deadlock of the system.\n"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-08T20:54:06.993Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-436.html"
}
],
"title": "arm: Guests can trigger a deadlock on Cortex-A77",
"workarounds": [
{
"lang": "en",
"value": "There are no known mitigations.\n"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2023-34320",
"datePublished": "2023-12-08T20:54:06.993Z",
"dateReserved": "2023-06-01T10:44:17.064Z",
"dateUpdated": "2025-11-04T19:16:33.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-34320 (GCVE-0-2023-34320)
Vulnerability from cvelistv5
Published
2023-12-08 20:54
Modified
2025-11-04 19:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under certain circumstances, could deadlock a core
due to the execution of either a load to device or non-cacheable memory,
and either a store exclusive or register read of the Physical
Address Register (PAR_EL1) in close proximity.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:16:33.356Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-436.html"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-436.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-436"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Systems running all version of Xen are affected.\n\nThis bug is specific to Arm Cortex-A77 cores r0p0 and r1p0.\n"
}
],
"datePublic": "2023-08-01T14:44:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412\nwhere software, under certain circumstances, could deadlock a core\ndue to the execution of either a load to device or non-cacheable memory,\nand either a store exclusive or register read of the Physical\nAddress Register (PAR_EL1) in close proximity.\n"
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "A (malicious) guest that doesn\u0027t include the workaround for erratum\n1508412 could deadlock the core. This will ultimately result to\na deadlock of the system.\n"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-08T20:54:06.993Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-436.html"
}
],
"title": "arm: Guests can trigger a deadlock on Cortex-A77",
"workarounds": [
{
"lang": "en",
"value": "There are no known mitigations.\n"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2023-34320",
"datePublished": "2023-12-08T20:54:06.993Z",
"dateReserved": "2023-06-01T10:44:17.064Z",
"dateUpdated": "2025-11-04T19:16:33.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}