MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
spectre
Recherche

New Spectre V2 Attack Impacts Linux Systems On Intel CPUs

samedi 13 avril 2024, 22:34 , par Slashdot
An anonymous reader shared this report from BleepingComputer:

Researchers have demonstrated the 'first native Spectre v2 exploit' for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors. Spectre V2 is a new variant of the original Spectre attack discovered by a team of researchers at the VUSec group from VU Amsterdam. The researchers also released a tool that uses symbolic execution to identify exploitable code segments within the Linux kernel to help with mitigation.

The new finding underscores the challenges in balancing performance optimization with security, which makes addressing fundamental CPU flaws complicated even six years after the discovery of the original Spectre....

As the CERT Coordination Center (CERT/CC) disclosed yesterday, the new flaw, tracked as CVE-2024-2201, allows unauthenticated attackers to read arbitrary memory data by leveraging speculative execution, bypassing present security mechanisms designed to isolate privilege levels. 'An unauthenticated attacker can exploit this vulnerability to leak privileged memory from the CPU by speculatively jumping to a chosen gadget,' reads the CERT/CC announcement. 'Current research shows that existing mitigation techniques of disabling privileged eBPF and enabling (Fine)IBT are insufficient in stopping BHI exploitation against the kernel/hypervisor.'

'For a complete list of impacted Intel processors to the various speculative execution side-channel flaws, check this page updated by the vendor.'

Read more of this story at Slashdot.
https://linux.slashdot.org/story/24/04/13/1911230/new-spectre-v2-attack-impacts-linux-systems-on-int...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Date Actuelle
dim. 24 nov. - 04:14 CET