x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-42331.json"
[
{
"events": [
{
"introduced": "4.5.0"
},
{
"last_affected": "4.17.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "37"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
}
]