March 21, 2023, 1:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

32bit actions attacks cve fedora meltdown path safety security spectre syscall vulnerability work x86 xen

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Program Associate, Cyber Risk

@ Kroll | Toronto, ONT, Canada

Cybersecurity Operations Engineer 2

@ Humana | Remote US

Vice President - Lead Security Engineer (SECS04)

@ JPMorgan Chase & Co. | Columbus, OH, United States

Security Specialist

@ BGIS | Markham, ON, Canada