Speculative execution allows processors to predict and pre-execute instructions, potentially speeding up processes. However, if the assumptions are incorrect, traces of sensitive data may remain in the processor cache, making it vulnerable to attackers.

This is not the first time this type of flaw has appeared. Specter v2 is based on the original Specter attack discovered in 2018. The new variant, tracked as CVE-2024−2201, allows attackers to steal sensitive information such as passwords and encryption keys from Linux kernel memory.

To help mitigate the consequences, researchers have released a tool that helps identify vulnerable sections of code in the Linux kernel.

Intel is also revising its recommendations to include hardware security features in future processors.

Source: Ferra

Previous article3 reasons to watch the most ambitious original movie on Apple TV+
Next articleHackers target US institutions after Microsoft hacks science and technology18:13 | April 14, 2024
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here