Description

Researchers have uncovered GhostRace (CVE-2024-2193), a data leakage attack affecting modern CPU architectures supporting speculative execution. A variant of Spectre v1 (CVE-2017-5753), GhostRace combines speculative execution and race conditions to bypass common synchronization primitives, creating Speculative Race Conditions (SRCs). These SRCs enable attackers to extract sensitive information from the target. The attack, discovered by the Systems Security Research Group at IBM Research Europe and VUSec, allows unauthenticated adversaries to access speculative executable code paths using Speculative Concurrent Use-After-Free (SCUAF) attacks. Similar to Spectre, GhostRace leverages speculative execution's erroneous predictions to access privileged data in memory. GhostRace exploits transiently executed paths originating from mis-speculated branches, targeting code snippets to disclose information to attackers. This method permits access to arbitrary sensitive data from host memory, affecting systems using conditional branches for synchronization primitives. Affected parties, including AMD and Xen, are taking steps to mitigate the vulnerability. AMD advises following existing guidance for Spectre, while Xen has introduced hardening patches, though they deem the threat unlikely to pose a significant security risk. Nevertheless, Xen implemented a LOCK_HARDEN mechanism as a precautionary measure. Given the potential severity of the vulnerability, ongoing research is expected, necessitating vigilance and proactive mitigation efforts across affected systems and platforms.