CERT Recently Published Vulnerability Notes

VU#488902: CPU hardware utilizing speculative execution may be vulnerable to speculative race conditions

Follow
A Speculative Race Condition (SRC) vulnerability, dubbed "GhostRace," affects CPUs with speculative execution capabilities. SRC exploits race conditions to access speculative execution code paths and disclose sensitive data. Unlike classic race conditions, SRCs are pervasive due to the common use of synchronization primitives. Attackers can exploit SRCs to read privileged data or system registry values. The vulnerability is similar to Spectre v1 but utilizes race conditions. GhostRace research expands on previous Spectre v1 attacks by including speculative execution attacks using race conditions. Vendors have released mitigations to address SRC vulnerabilities.
favicon
kb.cert.org
kb.cert.org
Create attached notes ...