In the Linux kernel, the following vulnerability has been resolved:
x86/srso: Add SRSO mitigation for Hygon processors
Add mitigation for the speculative return stack overflow vulnerability which exists on Hygon processors too.
{ "vanir_signatures": [ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ce2f297a7168274547d0b5aea6c7c16268b8a96", "signature_type": "Line", "target": { "file": "arch/x86/kernel/cpu/common.c" }, "id": "CVE-2023-52482-0e359450", "digest": { "threshold": 0.9, "line_hashes": [ "160049886716125647786865592617396976927", "258618900418239971080090707006981726085", "196393494590942056723608904689373933347", "75128095659490105359537567460635601199" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7ea043bc3f19473561c08565047b3f1671bf35d", "signature_type": "Line", "target": { "file": "arch/x86/kernel/cpu/common.c" }, "id": "CVE-2023-52482-4fa59f80", "digest": { "threshold": 0.9, "line_hashes": [ "66488591929819657254425144831359016372", "299846008079715661898136443001502569337", "181340684376675122040060855088797345419", "126331554103730074106960507139438714410" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a5ef7d68cea1344cf524f04981c2b3f80bedbb0d", "signature_type": "Line", "target": { "file": "arch/x86/kernel/cpu/common.c" }, "id": "CVE-2023-52482-8079d186", "digest": { "threshold": 0.9, "line_hashes": [ "160049886716125647786865592617396976927", "258618900418239971080090707006981726085", "196393494590942056723608904689373933347", "75128095659490105359537567460635601199" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf43b304b6952b549d58feabc342807b334f03d4", "signature_type": "Line", "target": { "file": "arch/x86/kernel/cpu/common.c" }, "id": "CVE-2023-52482-cd25f61c", "digest": { "threshold": 0.9, "line_hashes": [ "160049886716125647786865592617396976927", "258618900418239971080090707006981726085", "196393494590942056723608904689373933347", "75128095659490105359537567460635601199" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37", "signature_type": "Line", "target": { "file": "arch/x86/kernel/cpu/common.c" }, "id": "CVE-2023-52482-d1d7d4e4", "digest": { "threshold": 0.9, "line_hashes": [ "160049886716125647786865592617396976927", "258618900418239971080090707006981726085", "196393494590942056723608904689373933347", "75128095659490105359537567460635601199" ] }, "deprecated": false, "signature_version": "v1" } ] }