{"vulnerability": "cve-2022-42331", "sightings": [{"uuid": "d95e0697-91d7-4d7f-9068-41ee60a156b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42331", "type": "seen", "source": "https://t.me/cibsecurity/60373", "content": "\u203c CVE-2022-42331 \u203c\n\nx86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-21T15:34:58.000000Z"}]}