x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.5.0 (including) | 4.17.0 (including) |
Xen | Ubuntu | bionic | * |
Xen | Ubuntu | kinetic | * |
Xen | Ubuntu | lunar | * |
Xen | Ubuntu | mantic | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | xenial | * |