CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
23.1%
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | 11.0 | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
fedoraproject | fedora | 35 | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* |
fedoraproject | fedora | 36 | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
xen | xen | - | cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:* |
amd | athlon_x4_750_firmware | - | cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:* |
amd | athlon_x4_750 | - | cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:* |
amd | athlon_x4_760k_firmware | - | cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:* |
amd | athlon_x4_760k | - | cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:* |
amd | athlon_x4_830_firmware | - | cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:* |
amd | athlon_x4_830 | - | cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:* |
[
{
"vendor": "AMD",
"product": "AMD Processors",
"versions": [
{
"version": "Processor Some AMD Processors",
"status": "affected"
}
]
}
]
lists.debian.org/debian-lts-announce/2022/09/msg00011.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
security.gentoo.org/glsa/202402-07
www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
www.debian.org/security/2022/dsa-5207
www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
More
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
23.1%