Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-28956

Опубликовано: 13 мая 2025
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

New Spectre-v2 attack classes have been discovered within CPU architectures that enable self-training exploitation of speculative execution within the same privilege domain. These novel techniques bypass existing hardware and software mitigations, including IBPB, eIBRS, and BHI_NO, by leveraging in-kernel gadgets (potentially accessible via SECCOMP/cBPF), Branch Target Buffer (BTB) aliasing, and direct-to-indirect branch predictor training. While the root cause lies in CPU architectural behavior, the vulnerability manifests through kernel-level speculation paths, allowing attackers to potentially leak sensitive memory.

Отчет

The "Training Solo" attack classes introduce new self-training methods to exploit Spectre-v2 from within domain isolation implementations. They can be reasonably classified as Moderate severity due to several practical and architectural limitations. First, these attacks rely heavily on the presence of specific in-kernel or in-hypervisor gadgets, such as history-crafting or disclosure gadgets, which are not universally available and vary across kernel versions and configurations. Second, the attacks generally require local code execution within the victim domain, meaning they do not expand the threat model beyond existing Spectre-v2 scenarios where attackers already have some degree of execution capability. Third, the leak rates, while measurable, remain relatively low (1.7–17 KB/s) and demand sustained access and stability to extract meaningful information. So their limited practical exploitability makes them a moderate, not critical, threat in real-world settings.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelAffected
Red Hat Enterprise Linux 10microcode_ctlAffected
Red Hat Enterprise Linux 6kernelFix deferred
Red Hat Enterprise Linux 6microcode_ctlFix deferred
Red Hat Enterprise Linux 7kernelAffected
Red Hat Enterprise Linux 7microcode_ctlAffected
Red Hat Enterprise Linux 8kernelAffected
Red Hat Enterprise Linux 8microcode_ctlAffected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9microcode_ctlAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1421
https://bugzilla.redhat.com/show_bug.cgi?id=2366125microcode_ctl: From CVEorg collector

EPSS

Процентиль: 2%
0.00016
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 1 месяца назад

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
nvd
около 1 месяца назад

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
debian
около 1 месяца назад

Exposure of Sensitive Information in Shared Microarchitectural Structu ...

suse-cvrf
27 дней назад

Security update for xen

CVSS3: 5.6
github
около 1 месяца назад

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

EPSS

Процентиль: 2%
0.00016
Низкий

5.6 Medium

CVSS3