A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
[
{
"vendor": "AMD",
"product": "CPU",
"versions": [
{
"status": "affected",
"version": "See advisory AMD-SB-7016"
}
]
},
{
"vendor": "Xen",
"product": "Xen",
"versions": [
{
"status": "affected",
"version": "consult Xen advisory XSA-453"
}
]
}
]
www.openwall.com/lists/oss-security/2024/03/12/14
download.vusec.net/papers/ghostrace_sec24.pdf
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
kb.cert.org/vuls/id/488902
lists.fedoraproject.org/archives/list/[email protected]/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
lists.fedoraproject.org/archives/list/[email protected]/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
lists.fedoraproject.org/archives/list/[email protected]/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
www.kb.cert.org/vuls/id/488902
www.vusec.net/projects/ghostrace/
xenbits.xen.org/xsa/advisory-453.html