x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
2023-03-21T13:15:11.833
2024-11-21T07:24:46.073
Modified
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | xen | xen | ≤ 4.17.0 | Yes |
| Operating System | fedoraproject | fedora | 37 | Yes |
| Operating System | fedoraproject | fedora | 38 | Yes |