Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-29901

Опубликовано: 12 июл. 2022
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelWill not fix
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:733802.11.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:733702.11.2022
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:713425.10.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:711025.10.2022
Red Hat Enterprise Linux 9kernelFixedRHSA-2022:826715.11.2022
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2022:793315.11.2022
Red Hat Enterprise Linux 9kernelFixedRHSA-2022:826715.11.2022
Red Hat Enterprise Linux 9.0 Extended Update SupportkernelFixedRHSA-2022:897313.12.2022
Red Hat Enterprise Linux 9.0 Extended Update Supportkernel-rtFixedRHSA-2022:897413.12.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2103148hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions

EPSS

Процентиль: 24%
0.00077
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
nvd
почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
debian
почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre ...

CVSS3: 6.5
github
почти 3 года назад

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS3: 5.6
fstec
почти 3 года назад

Уязвимость микропрограммного обеспечения процессоров Intel и AMD, позволяющая нарушителю раскрыть защищаемую информацию из памяти ядра или осуществить атаку на хост-систему из виртуальных машин

EPSS

Процентиль: 24%
0.00077
Низкий

5.6 Medium

CVSS3