Vulnerability Details : CVE-2022-29901
Potential exploit
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Vulnerability category: Information leak
Products affected by CVE-2022-29901
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6300t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6320_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6102e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6600k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6500t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6400_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6400t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6440eq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6442eq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8510y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_m5-6y54_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8670_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8670t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8420_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8420t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8650_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8000t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8020_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-8120_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8650k_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6120_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6120t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6320t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-6510u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6210u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-6310u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i3-6110u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8560u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i7-8750hf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:core_i5-8550u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29901
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29901
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
NIST | |
5.6
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.1
|
4.0
|
Intel Corporation | 2024-02-04 |
5.6
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.1
|
4.0
|
Switzerland Government Common Vulnerability Program |
CWE ids for CVE-2022-29901
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- secure@intel.com (Secondary)
- vulnerability@ncsc.ch (Secondary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-29901
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
[SECURITY] [DLA 3102-1] linux-5.10 new package
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
[SECURITY] Fedora 36 Update: kernel-5.18.11-200.fc36 - package-announce - Fedora Mailing-Lists
-
http://www.openwall.com/lists/oss-security/2022/07/12/2
oss-security - Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
[SECURITY] Fedora 35 Update: kernel-5.18.11-100.fc35 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/07/13/1
oss-security - Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
[SECURITY] Fedora 35 Update: kernel-5.18.11-100.fc35 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
[SECURITY] Fedora 36 Update: kernel-5.18.11-200.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/07/12/4
oss-security - Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions
-
http://www.openwall.com/lists/oss-security/2022/07/12/5
oss-security - Re: Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions
-
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
[SECURITY] [DLA 3245-1] linux security update
-
https://comsec.ethz.ch/retbleed
Retbleed: Arbitrary Speculative Code Execution with Return Instructions – Computer Security Group
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html
INTEL-SA-00702
-
https://security.gentoo.org/glsa/202402-07
Xen: Multiple Vulnerabilities (GLSA 202402-07) — Gentoo security
-
https://www.debian.org/security/2022/dsa-5207
Debian -- Security Information -- DSA-5207-1 linux
-
https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
Retbleed: Intel and AMD Processors Vulnerability. Patch Now!
-
https://security.netapp.com/advisory/ntap-20221007-0007/
CVE-2022-29901 Intel Processor Vulnerability in NetApp Products | NetApp Product Security
Jump to