2024-03-17 23:03:26 +00:00

52 lines
2.0 KiB
JSON

{
"id": "CVE-2024-2193",
"sourceIdentifier": "cret@cert.org",
"published": "2024-03-15T18:15:08.530",
"lastModified": "2024-03-17T22:38:29.433",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths."
},
{
"lang": "es",
"value": "Se ha revelado una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n especulativa (SRC) que afecta a las arquitecturas de CPU modernas que admiten la ejecuci\u00f3n especulativa (relacionada con Spectre V1). Un atacante no autenticado puede aprovechar esta vulnerabilidad para revelar datos arbitrarios de la CPU utilizando condiciones de ejecuci\u00f3n para acceder a las rutas de c\u00f3digo ejecutable especulativas."
}
],
"metrics": {},
"references": [
{
"url": "https://download.vusec.net/papers/ghostrace_sec24.pdf",
"source": "cret@cert.org"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23",
"source": "cret@cert.org"
},
{
"url": "https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace",
"source": "cret@cert.org"
},
{
"url": "https://kb.cert.org/vuls/id/488902",
"source": "cret@cert.org"
},
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/488902",
"source": "cret@cert.org"
},
{
"url": "https://www.vusec.net/projects/ghostrace/",
"source": "cret@cert.org"
},
{
"url": "https://xenbits.xen.org/xsa/advisory-453.html",
"source": "cret@cert.org"
}
]
}