![]() Variant 3: rogue data cache load ( CVE-2017-5754) Variant 2: branch target injection (CVE-2017-5715) Variant 1: bounds check bypass (CVE-2017-5753) So far, there are three known variants of the issue: What is the Spectre security bug in Intel/AMD/ARM cpus? ![]() Spectre is harder to exploit than Meltdown CPU bug, but it is also harder to mitigate. It was independently discovered and reported by various teams including Google Project Zero. How do I protect my Linux server and laptop/desktop against such attack?Ī very serious security problem has been found and patched in the Linux kernel. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. ![]() Spectre CPU Vulnerability CVE-2017-5753/CVE-2017-5715 breaks the isolation between different applications. A very serious security problem has been found in the Intel/AMD/ARM CPUs. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |