CVE-2022-29901 - Exposure of Resource to Wrong Sphere

Severity

65%

Complexity

20%

Confidentiality

66%

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

CVSS 3.1 Base Score 6.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).

CVSS 2.0 Base Score 1.9. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:N/A:N).

Overview

First reported 2 years ago

2022-07-12 19:15:00

Last updated 2 years ago

2022-12-24 01:15:00

Affected Software

Xen

References

[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html

https://comsec.ethz.ch/retbleed

[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

FEDORA-2022-c69ef9c1dd

FEDORA-2022-8aab5b5cde

[oss-security] 20220712 Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

Mailing List, Patch, Third Party Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html

Vendor Advisory

https://comsec.ethz.ch/retbleed

Exploit, Technical Description, Third Party Advisory

[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

Mailing List, Third Party Advisory

[oss-security] 20220712 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

Mailing List, Third Party Advisory

[oss-security] 20220713 Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

Mailing List, Third Party Advisory

FEDORA-2022-c69ef9c1dd

Mailing List, Third Party Advisory

FEDORA-2022-8aab5b5cde

Mailing List, Third Party Advisory

DSA-5207

[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package

https://security.netapp.com/advisory/ntap-20221007-0007/

DSA-5207

Third Party Advisory

[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package

Mailing List, Third Party Advisory

https://security.netapp.com/advisory/ntap-20221007-0007/

Third Party Advisory

[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.