First published: Tue Mar 21 2023(Updated: )
x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | <=4.17.0+46-gaaf74a532c-1<=4.14.5+86-g1c354767d5-1 | 4.14.5+94-ge49571868d-1 4.17.0+74-g3eac216e6e-1 |
debian/xen | <=4.11.4+107-gef32c7afa2-1 | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 |
Xen Xen | >=4.5.0<=4.17.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42331 is a speculative vulnerability in the 32-bit SYSCALL path in x86 architecture.
CVE-2022-42331 has a severity rating of 5.5 (medium).
The affected software includes Xen and Fedora versions 37 and 38.
To fix CVE-2022-42331, make sure to update to the recommended versions of the affected software.
You can find more information about CVE-2022-42331 on the Debian Security Tracker website.