Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-42331
HistoryMar 21, 2023 - 1:15 p.m.

CVE-2022-42331

2023-03-2113:15:11
Debian Security Bug Tracker
security-tracker.debian.org
9
cve-2022
x86
speculative vulnerability
32bit syscall
spectre/meltdown
xsa-254
speculation-safety
ret instruction
speculative attacks
unix

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.0%

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

OSVersionArchitecturePackageVersionFilename
Debian12allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb
Debian11allxen< 4.14.5+94-ge49571868d-1xen_4.14.5+94-ge49571868d-1_all.deb
Debian999allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb
Debian13allxen< 4.17.0+74-g3eac216e6e-1xen_4.17.0+74-g3eac216e6e-1_all.deb

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

18.0%