Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2193

Опубликовано: 12 мар. 2024
Источник: redhat
CVSS3: 5.5

Описание

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

A new cache speculation vulnerability, known as Spectre-SRC (Speculative Race Conditions), was found in hw. Spectre-SRC is similar to the Spectre v1 and allows speculative use-after-free. The difference between this issue and Spectre V1 is that this issue is based on synchronization primitives with the possibility to bypass software features such as IPIs and high-precision timers, which may disclose arbitrary data from a privileged component that should not be accessible.

Отчет

This vulnerability poses a moderate severity issue primarily due to its potential for widespread impact across various hardware and software vendors, especially those previously affected by Spectre v1. By targeting the Linux kernel and hardware platforms supporting branch speculation, attackers exploit a race condition occurring on transiently executed paths, akin to Spectre v1, to disclose sensitive information. Unlike traditional race conditions, speculative race conditions are prevalent due to the behavior of common synchronization primitives on such paths. Although the vulnerability's exploitation has been demonstrated through a proof-of-concept exploit targeting specific patterns like speculative use-after-free for control-flow hijacking on Linux, its broader applicability underscores its significance. Exploitation follows a threat model resembling Spectre v1 but necessitates the exploitation of additional software features, such as inter-process interrupts and high-precision timers, to synchronize and enable successful attacks.

Меры по смягчению последствий

There is a fix that is known as another CVE-2024-26602 and it can be considered as mitigation for this issue. It doesn't resolve this issue completely, but prevents it.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 8kernelWill not fix
Red Hat Enterprise Linux 8kernel-rtWill not fix
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1300
https://bugzilla.redhat.com/show_bug.cgi?id=2262051hw: Spectre-SRC that is Speculative Race Conditions (SRCs) for synchronization primitives similar like Spectre V1 with possibility to bypass software features (e.g., IPIs, high-precision timers, etc)

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
ubuntu
больше 1 года назад

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

CVSS3: 5.7
nvd
больше 1 года назад

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

CVSS3: 5.7
debian
больше 1 года назад

A Speculative Race Condition (SRC) vulnerability that impacts modern C ...

CVSS3: 5.7
github
больше 1 года назад

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость микропрограммного обеспечения процессоров Intel, AMD, ARM и IBM, связанная с возникновением в спекулятивном режиме состояний гонки, способных привести к обращению к уже освобождённым областям памяти, в случае неверного прогнозирования процессором ветвления в коде, позволяющая нарушителю получить доступ к защищенной памяти

5.5 Medium

CVSS3