First published: Tue Aug 01 2023(Updated: )
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Arm Cortex-A77 Firmware | =r0p0 | |
Arm Cortex-A77 Firmware | =r1p0 | |
Arm Cortex-A77 Firmware | ||
Xen xen-unstable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34320 has a severity rating that indicates it could lead to system instability due to potential deadlocks in Cortex-A77 cores.
To address CVE-2023-34320, update the Cortex-A77 firmware to a version that includes the erratum mitigation.
CVE-2023-34320 affects the Cortex-A77 firmware versions r0p0 and r1p0.
CVE-2023-34320 can cause deadlocks in the CPU which may lead to performance degradation or system hang.
Currently, a specific workaround for CVE-2023-34320 has not been publicly documented, and applying the firmware update is recommended.