Description
x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5378-1 | xen security update |
References
History
No history.
Status: PUBLISHED
Assigner: XEN
Published:
Updated: 2025-02-13T16:33:19.580Z
Reserved: 2022-10-03T00:00:00.000Z
Link: CVE-2022-42331
No data.
Status : Modified
Published: 2023-03-21T13:15:11.833
Modified: 2024-11-21T07:24:46.073
Link: CVE-2022-42331
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA