2024-12-19 23:03:43 +00:00
{
"id" : "CVE-2024-2201" ,
"sourceIdentifier" : "cret@cert.org" ,
"published" : "2024-12-19T21:15:08.103" ,
"lastModified" : "2024-12-19T21:15:08.103" ,
"vulnStatus" : "Received" ,
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems."
2024-12-22 03:03:49 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de cross-privilege en Spectre v2 permite a los atacantes eludir todas las mitigaciones implementadas, incluida la reciente Fine (IBT), y filtrar memoria arbitraria del kernel de Linux en sistemas Intel."
2024-12-19 23:03:43 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "http://www.openwall.com/lists/oss-security/2024/04/09/15" ,
"source" : "cret@cert.org"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/07/7" ,
"source" : "cret@cert.org"
} ,
{
"url" : "http://xenbits.xen.org/xsa/advisory-456.html" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm" ,
"source" : "cret@cert.org"
} ,
{
"url" : "https://www.kb.cert.org/vuls/id/155143" ,
"source" : "cret@cert.org"
}
]
}