The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
Affected versions of this package are vulnerable to Buffer Overflow such that it is possible for a guest to under or overflow the thread counter, because each write to VIRT_SPEC_CTRL.SSBD
by the guest gets propagated to the helper that does the per-core active accounting. Underflowing the counter causes the value to get saturated, and thus attempts for guests running on the same core to set SSBD won't have an effect because the hypervisor assumes it's already active.
Note:
Only x86 AMD systems are vulnerable. The vulnerability can be leveraged by and affects only HVM guests.
Running PV guests only will prevent the vulnerability.
Setting spec-ctrl=ssbd
on the hypervisor command line will force SSBD
to be unconditionally active.