CVE-2024-2193

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/12/14
https://download.vusec.net/papers/ghostrace_sec24.pdf
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
https://kb.cert.org/vuls/id/488902
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
https://www.kb.cert.org/vuls/id/488902
https://www.vusec.net/projects/ghostrace/
https://xenbits.xen.org/xsa/advisory-453.html
http://www.openwall.com/lists/oss-security/2024/03/12/14
https://download.vusec.net/papers/ghostrace_sec24.pdf
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
https://kb.cert.org/vuls/id/488902
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
https://www.kb.cert.org/vuls/id/488902
https://www.vusec.net/projects/ghostrace/
https://xenbits.xen.org/xsa/advisory-453.html
Configurations

No configuration.

History

21 Nov 2024, 09:09

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/03/12/14 - () http://www.openwall.com/lists/oss-security/2024/03/12/14 -
References () https://download.vusec.net/papers/ghostrace_sec24.pdf - () https://download.vusec.net/papers/ghostrace_sec24.pdf -
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23 - () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23 -
References () https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace - () https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace -
References () https://kb.cert.org/vuls/id/488902 - () https://kb.cert.org/vuls/id/488902 -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/ -
References () https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html - () https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html -
References () https://www.kb.cert.org/vuls/id/488902 - () https://www.kb.cert.org/vuls/id/488902 -
References () https://www.vusec.net/projects/ghostrace/ - () https://www.vusec.net/projects/ghostrace/ -
References () https://xenbits.xen.org/xsa/advisory-453.html - () https://xenbits.xen.org/xsa/advisory-453.html -

29 Oct 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.7
CWE CWE-362

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/12/14 -

30 Mar 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/ -

30 Mar 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/ -

23 Mar 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/ -

16 Mar 2024, 16:15

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/488902 -
Summary
  • (es) Se ha revelado una vulnerabilidad de condición de ejecución especulativa (SRC) que afecta a las arquitecturas de CPU modernas que admiten la ejecución especulativa (relacionada con Spectre V1). Un atacante no autenticado puede aprovechar esta vulnerabilidad para revelar datos arbitrarios de la CPU utilizando condiciones de ejecución para acceder a las rutas de código ejecutable especulativas.

15 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-15 18:15

Updated : 2024-11-21 09:09


NVD link : CVE-2024-2193

Mitre link : CVE-2024-2193

CVE.ORG link : CVE-2024-2193


JSON object : View

Products Affected

No product.

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')