Unrated severityNVD Advisory· Published Mar 12, 2022· Updated Aug 3, 2024
CVE-2022-23960
CVE-2022-23960
Description
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.
Affected products
44- Arm/Cortex and Neoverse processorsdescription
- osv-coords43 versionspkg:rpm/almalinux/bpftoolpkg:rpm/almalinux/kernelpkg:rpm/almalinux/kernel-abi-stablelistspkg:rpm/almalinux/kernel-corepkg:rpm/almalinux/kernel-cross-headerspkg:rpm/almalinux/kernel-debugpkg:rpm/almalinux/kernel-debug-corepkg:rpm/almalinux/kernel-debug-develpkg:rpm/almalinux/kernel-debug-modulespkg:rpm/almalinux/kernel-debug-modules-extrapkg:rpm/almalinux/kernel-develpkg:rpm/almalinux/kernel-docpkg:rpm/almalinux/kernel-headerspkg:rpm/almalinux/kernel-modulespkg:rpm/almalinux/kernel-modules-extrapkg:rpm/almalinux/kernel-toolspkg:rpm/almalinux/kernel-tools-libspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/almalinux/kernel-zfcpdumppkg:rpm/almalinux/kernel-zfcpdump-corepkg:rpm/almalinux/kernel-zfcpdump-develpkg:rpm/almalinux/kernel-zfcpdump-modulespkg:rpm/almalinux/kernel-zfcpdump-modules-extrapkg:rpm/almalinux/perfpkg:rpm/almalinux/python3-perfpkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_30&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.18.0-425.3.1.el8+ 42 more
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.18.0-425.3.1.el8
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-16.97.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 4.12.14-122.116.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.debian.org/security/2022/dsa-5173mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2022/03/18/2mitremailing-listx_refsource_MLIST
- developer.arm.com/support/arm-security-updatesmitrex_refsource_MISC
- developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitymitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.