Speculative Vulnerability in 32bit SYSCALL Path for Xen Project
CVE-2022-42331

5.5MEDIUM

Key Information:

Vendor
CVE Published:
21 March 2023

What is CVE-2022-42331?

This vulnerability stems from a late execution of speculation-safety actions in the 32bit SYSCALL path of the Xen Hypervisor, potentially allowing attackers to exploit an unprotected RET instruction. Such an oversight from the original Spectre/Meltdown mitigation efforts opens avenues for speculative attacks under certain configurations, leading to possible information leaks or system integrity issues.

Affected Version(s)

xen consult Xen advisory XSA-429

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Andrew Cooper of XenServer.'}]}}}
.