Speculative Vulnerability in 32bit SYSCALL Path for Xen Project
CVE-2022-42331
5.5MEDIUM
What is CVE-2022-42331?
This vulnerability stems from a late execution of speculation-safety actions in the 32bit SYSCALL path of the Xen Hypervisor, potentially allowing attackers to exploit an unprotected RET instruction. Such an oversight from the original Spectre/Meltdown mitigation efforts opens avenues for speculative attacks under certain configurations, leading to possible information leaks or system integrity issues.
Affected Version(s)
xen consult Xen advisory XSA-429
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Andrew Cooper of XenServer.'}]}}}