Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f5x9-rprw-5rc4

Опубликовано: 21 мар. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

EPSS

Процентиль: 14%
0.00046
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

CVSS3: 5.5
nvd
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

CVSS3: 5.5
debian
почти 3 года назад

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversig ...

suse-cvrf
почти 3 года назад

Security update for xen

suse-cvrf
почти 3 года назад

Security update for xen

EPSS

Процентиль: 14%
0.00046
Низкий

5.5 Medium

CVSS3