Bug 2267028 (CVE-2023-52482)
Summary: | CVE-2023-52482 kernel: x86/srso: Add SRSO mitigation for Hygon processors | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, llong, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, scweaver, sidakwo, sukulkar, tglozar, vkumar, vsroka, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 5.15.134, kernel 6.1.56, kernel 6.5.6, kernel 6.6 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the Linux kernel, where the Hygon x86 processor is susceptible to a speculative return stack overflow.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2267029 | ||
Bug Blocks: | 2266913 |
Description
Avinash Hanwate
2024-02-29 11:11:28 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2267029] This was fixed for Fedora with the 6.5.6 stable kernel updates. Note that Hygon is not a x86 processor variant that RHEL officially support. Fixing it is easy, but it is up to the product managers to decide if we want to get this fixed. This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9315 https://access.redhat.com/errata/RHSA-2024:9315 |