Security News > 2024 > April > New Spectre v2 attack impacts Linux systems on Intel CPUs
Researchers have demonstrated the "First native Spectre v2 exploit" for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors.
Spectre V2 is a new variant of the original Spectre attack discovered by a team of researchers at the VUSec group from VU Amsterdam.
The new finding underscores the challenges in balancing performance optimization with security, which makes addressing fundamental CPU flaws complicated even six years after the discovery of the original Spectre.
Intel has already assigned CVE-2022-0001 and CVE-2022-0002 to BTI and BHI, respectively, while CVE-2024-2201 involves a new Spectre v2 exploit that works against the Linux kernel.
An exploit demonstrating the new Spectre V2 flaw can be seen in the video below.
Intel has also updated its mitigation recommendations for Spectre v2 and now proposes disabling unprivileged Extended Berkeley Packet Filter functionality, enabling Enhanced Indirect Branch Restricted Speculation, and enabling Supervisor Mode Execution Protection.
News URL
Related news
- New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems (source)
- New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors (source)
- Windows infected with backdoored Linux VMs in new phishing attacks (source)
- Apple fixes two zero-days used in attacks on Intel-based Macs (source)
- Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor (source)
- ESET researchers analyze first UEFI bootkit for Linux systems (source)
- BootKitty UEFI malware exploits LogoFAIL to infect Linux systems (source)