Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-29900

Опубликовано: 12 июл. 2022
Источник: debian

Описание

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.18.14-1package
linuxignoredbusterpackage
xenfixed4.16.2-1package
xenend-of-lifebusterpackage

Примечания

  • https://comsec.ethz.ch/research/microarch/retbleed/

  • https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf

  • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037

  • https://xenbits.xen.org/xsa/advisory-407.html

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 3 года назад

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
redhat
почти 3 года назад

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 6.5
nvd
почти 3 года назад

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

msrc
почти 3 года назад

AMD: CVE-2022-29900 AMD CPU Branch Type Confusion

CVSS3: 6.5
github
почти 3 года назад

AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.