In the Linux kernel, the following vulnerability has been resolved:
x86/srso: Add SRSO mitigation for Hygon processors
Add mitigation for the speculative return stack overflow vulnerability which exists on Hygon processors too.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ce2f297a7168274547d0b5aea6c7c16268b8a96",
"target": {
"file": "arch/x86/kernel/cpu/common.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-52482-0e359450",
"signature_type": "Line",
"digest": {
"line_hashes": [
"160049886716125647786865592617396976927",
"258618900418239971080090707006981726085",
"196393494590942056723608904689373933347",
"75128095659490105359537567460635601199"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7ea043bc3f19473561c08565047b3f1671bf35d",
"target": {
"file": "arch/x86/kernel/cpu/common.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-52482-4fa59f80",
"signature_type": "Line",
"digest": {
"line_hashes": [
"66488591929819657254425144831359016372",
"299846008079715661898136443001502569337",
"181340684376675122040060855088797345419",
"126331554103730074106960507139438714410"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a5ef7d68cea1344cf524f04981c2b3f80bedbb0d",
"target": {
"file": "arch/x86/kernel/cpu/common.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-52482-8079d186",
"signature_type": "Line",
"digest": {
"line_hashes": [
"160049886716125647786865592617396976927",
"258618900418239971080090707006981726085",
"196393494590942056723608904689373933347",
"75128095659490105359537567460635601199"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf43b304b6952b549d58feabc342807b334f03d4",
"target": {
"file": "arch/x86/kernel/cpu/common.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-52482-cd25f61c",
"signature_type": "Line",
"digest": {
"line_hashes": [
"160049886716125647786865592617396976927",
"258618900418239971080090707006981726085",
"196393494590942056723608904689373933347",
"75128095659490105359537567460635601199"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37",
"target": {
"file": "arch/x86/kernel/cpu/common.c"
},
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-52482-d1d7d4e4",
"signature_type": "Line",
"digest": {
"line_hashes": [
"160049886716125647786865592617396976927",
"258618900418239971080090707006981726085",
"196393494590942056723608904689373933347",
"75128095659490105359537567460635601199"
],
"threshold": 0.9
}
}
]