Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42331

Опубликовано: 21 мар. 2023
Источник: debian

Описание

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.17.0+74-g3eac216e6e-1package
xenend-of-lifebusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2023/03/21/3

  • https://xenbits.xen.org/xsa/advisory-429.html

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

CVSS3: 5.5
nvd
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

CVSS3: 5.5
github
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

suse-cvrf
почти 3 года назад

Security update for xen

suse-cvrf
почти 3 года назад

Security update for xen