ALAS2KERNEL-5.15-2022-006 --- kernelID: oval:org.secpod.oval:def:1700997 | Date: (C)2022-08-24 (M)2024-05-22 |
Class: PATCH | Family: unix |
A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure. A flaw was found in hw. In certain processors with Intel's Enhanced Indirect Branch Restricted Speculation capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer prediction. A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel Processors may allow an authorized user to enable information disclosure via local access. A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel processors may potentially allow an authorized user to enable information disclosure via local access
Product: |
kernel |
perf |
python-perf |
bpftool |