Cyber security news for all

More

    Microcode Update Is Available Along With All Linux Kernel Patches Related To Specter

    Attacks with speculative execution of the processor is about a route to speculate, that not speculative performance follows. In this case, a kernel function can be included that prevents the code from accessing the end of an array, thereby returning an error. An attack that uses the Specter vulnerability skips this control, which can be used to access data, the code that was specifically written not to access it. The error fix is a note that possibly will damage the system.

    By executing malicious code on an affected system, an attacker could read memory contents of other running processes on the same system, such as cached passwords or other private data. The vulnerabilities can only be exploited if an attacker can execute their own code by either starting their own program or injecting malicious code through another vulnerability. The meltdown attack scenario uses the side effects of a technology known as out-of-order execution. The Specter program aims at functions for branch prediction and speculative execution of modern processors.

    Linux Kernel Security

    Affected Systems

    Many products use one or more CPUs, especially the SyncFire product families have at least one management CPU and additional CPU cards such as the HPS-100 modules. The management CPU of these products is a Geode embedded microprocessor. AMD as the manufacturer of the CPU has unfortunately not published a detailed list of all CPU models and their status with regard to Specter. Instead, AMD announced that all AMD CPUs are affected by the bounds check bypass vulnerability.

    A technical analysis of the AMD processor was carried out by Specter suppliers. Newspapers were informed that with a 100% certainty that the AMD Geode LX is not affected. The CPU does not support speculative execution and the out-of-order execution capabilities of the CPU are only mentioned in relation to the processor in the data sheet.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox