Get the latest tech news

Spectre Flaws Still Haunt Intel, AMD as Researchers Found Fresh Attack Method


"Six years after the Spectre transient execution processor design flaws were disclosed, efforts to patch the problem continue to fall short," writes the Register: Johannes Wikner and Kaveh Razavi of Swiss University ETH Zurich on Friday published details about a cross-process Spectre attack that de...

"Six years after the Spectre transient execution processor design flaws were disclosed, efforts to patch the problem continue to fall short," writes the Register: Johannes Wikner and Kaveh Razavi of Swiss University ETH Zurich on Friday published details about a cross-process Spectre attack that derandomizes Address Space Layout Randomization and leaks the hash of the root password from the Set User ID (suid) process on recent Intel processors. Wikner and Razavi also managed to leak arbitrary kernel memory from an unprivileged process on AMD silicon built with its Zen 2 architecture. BleepingComputer adds that the ETH Zurich team "is working with Linux kernel maintainers to develop a patch for AMD processors, which will be available here when ready."

Get the Android app

Or read this on Slashdot

Read more on:

Photo of Intel

Intel

Photo of AMD

AMD

Photo of researchers

researchers

Related news:

News photo

Intel Working On Coreboot Support For Xeon 6 Platforms

News photo

Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass

News photo

Spectre flaws continue to haunt Intel and AMD as researchers find fresh attack method