{"id":"CVE-2022-0001","details":"Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.","modified":"2026-03-15T14:45:54.639215Z","published":"2022-03-11T18:15:25.143Z","related":["ALSA-2022:1988","MGASA-2022-0100","MGASA-2022-0101","SUSE-SU-2022:0755-1","SUSE-SU-2022:0756-1","SUSE-SU-2022:0757-1","SUSE-SU-2022:0759-1","SUSE-SU-2022:0760-1","SUSE-SU-2022:0761-1","SUSE-SU-2022:0762-1","SUSE-SU-2022:0763-1","SUSE-SU-2022:0764-1","SUSE-SU-2022:0765-1","SUSE-SU-2022:0766-1","SUSE-SU-2022:0767-1","SUSE-SU-2022:0768-1","SUSE-SU-2022:0931-1","SUSE-SU-2022:0939-1","SUSE-SU-2022:0940-1","SUSE-SU-2022:1196-1","SUSE-SU-2022:1285-1","SUSE-SU-2022:1300-1","SUSE-SU-2022:1359-1","SUSE-SU-2022:1375-1","SUSE-SU-2022:1408-1","SUSE-SU-2022:14905-1","openSUSE-SU-2022:0755-1","openSUSE-SU-2022:0760-1","openSUSE-SU-2022:0768-1","openSUSE-SU-2022:0940-1","openSUSE-SU-2024:11930-1"],"references":[{"type":"WEB","url":"https://www.kb.cert.org/vuls/id/155143"},{"type":"WEB","url":"https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevUrl=wizard"},{"type":"WEB","url":"https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevUrl=wizard"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/03/18/2"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220818-0004/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0001.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"22.1.3"}]},{"events":[{"introduced":"0"},{"last_affected":"22.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"22.2.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}