CERT Recently Published Vulnerability Notes 2024年07月06日
VU#488902: CPU hardware utilizing speculative execution may be vulnerable to speculative race conditions
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

GhostRace 是一种新型的 CPU 漏洞,利用了现代 CPU 架构中推测执行机制的缺陷。攻击者可以通过利用竞争条件来访问推测执行的代码路径,从而泄露 CPU 中的任意数据。该漏洞与 Spectre v1 类似,但利用了竞争条件来实现攻击,因此被称为 GhostRace。

👻 **利用推测执行机制的缺陷**: GhostRace 利用了 CPU 的推测执行机制,该机制允许 CPU 在确定最终结果之前提前执行指令,以提高性能。但攻击者可以利用推测执行过程中产生的缓存、缓冲区和分支预测等痕迹来推断敏感数据。

🚀 **攻击原理**: GhostRace 攻击者利用竞争条件来访问推测执行的代码路径。当多个线程试图访问同一个共享资源时,攻击者可以利用竞争条件来欺骗系统执行恶意操作,从而泄露敏感信息。

🛡️ **影响**: 攻击者可以通过利用 GhostRace 漏洞来读取任意敏感数据,例如系统注册表值。

🚧 **解决方案**: 为了修复该漏洞,请根据相关供应商的建议更新您的软件,以获取最新的安全补丁。

Overview

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution has been discovered. CPU hardware utilizing speculative execution that are vulnerable to Spectre v1 are likely affected. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths. Security researchers have labeled this variant of the Spectre v1 vulnerability “GhostRace", for ease of communication.

Description

Speculative execution is an optimization technique where a computer system performs some task preemptively to improve performance and provide additional concurrency as and when extra resources are available. However, these speculative executions leave traces of memory accesses or computations in the CPU’s cache, buffer, and branch predictors. Attackers can take advantage of these and, in some cases, also influence speculative execution paths via malicious software to infer privileged data that is part of a distinct execution. Attackers exploiting Spectre v1 take advantage of the speculative execution of conditional branch instructions used for memory access bounds checks. These are discussed in some amount of detail in the article Spectre Side Channels found at kernel.org. The earlier research did not include any of the speculative execution attacks using race conditions. Race conditions, generally considered part of concurrency bugs, occur when two or more threads attempt to access the same, shared resource without proper synchronization, which can create an opportunity for an attacker to trick a system into carrying out unauthorized actions in addition to its normal processes. This recent research explores a speculative race condition attack against the speculative execution facility of the modern CPUs.

In characteristics and exploitation strategy, an SRC vulnerability is similar to a classic race condition. However, it is different in that the attacker exploits said race condition on a transiently executed path originating from a mis-speculated branch (similar to Spectre v1), targeting a racy code snippet or gadget that ultimately discloses information to the attacker. Another major difference is that while classic race conditions are relatively infrequent in production code bases, speculative race conditions can be pervasive. Common synchronization primitives all exhibit no-op-like behavior on a transiently executed path, essentially causing any of the critical regions in victim software to become vulnerable. In practice, whether a particular critical region is actually exploitable or not depends on the characteristics of the resulting race condition, similar in some ways to the exploitation of the classic race condition.

Impact

An attacker with access to CPU resources may be able to read arbitrary privileged data or system registry values by utilizing the race condition, termed as speculative race condition.

Solution

Please update your software according to the recommendations from respective vendors with the latest mitigations available to address this vulnerability and its variants.

Acknowledgements

Thanks to Hany Ragab and Cristiano Giuffrida from the VUSec group at VU Amsterdam and Andrea Mambretti and AnilKurmus from IBM Research Europe, Zurich for discovering and reporting this vulnerability, as well as supporting coordinated disclosure. This document was written by Dr. Elke Drennan, CISSP.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2024-2193
Date Public: 2024-03-14
Date First Published: 2024-03-14
Date Last Updated: 2024-03-19 21:48 UTC
Document Revision: 3

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

GhostRace CPU 漏洞 推测执行 竞争条件 安全威胁
相关文章