Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass

October 18, 2024 at 10:49AM Recent research reveals new speculative execution vulnerabilities in Intel’s 12th-14th gen processors and AMD’s Zen 1-2 chips, bypassing existing Spectre mitigations. Attacks exploit flaws in the Indirect Branch Predictor Barrier, allowing sensitive data leaks. Intel and AMD are aware and addressing these issues, with ongoing patch development for Linux. ### … Read more

New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous

August 5, 2024 at 09:42AM Researchers from Graz University of Technology have introduced SLUBStick, a Linux kernel exploitation technique that can increase the impact of heap vulnerabilities. This method can lead to privilege escalation and container escapes, even with modern defenses enabled. The technique demonstrates a success rate of more than 99% and has been … Read more

New TikTag Attack Targets Arm CPU Security Feature 

June 18, 2024 at 12:36PM Researchers have uncovered a new speculative execution attack targeting Arm CPUs’ Memory Tagging Extension (MTE), bypassing security measures. The attack, discovered by a team from Seoul National University, Samsung Research, and Georgia Tech, allows exploitation of memory corruption vulnerabilities for various malicious purposes. The researchers demonstrated its success against Chrome … Read more

Check Point warns customers to patch VPN vulnerability under active exploitation

June 3, 2024 at 08:12AM Cybersecurity software vendor Check Point detected a zero-day vulnerability being actively exploited. The vulnerability, assigned CVE-2024-24919, affects several Check Point products and can result in unauthorized access to sensitive information. Check Point advised users to update their software and harden their VPN posture. Additionally, various other critical vulnerabilities in different … Read more

CISA warns of actively exploited Linux privilege elevation flaw

May 31, 2024 at 03:35PM CISA added two vulnerabilities to its KEV catalog, including a Linux kernel privilege escalation flaw (CVE-2024-1086) and an info disclosure flaw on VPN devices (CVE-2024-24919). The former allows local attackers to gain root-level access, with a public exploit available. CISA has set a patching deadline for federal agencies and suggested … Read more

CISA Warns of Exploited Linux Kernel Vulnerability

May 31, 2024 at 07:36AM CISA warns of active exploitation of Linux kernel vulnerability CVE-2024-1086, enabling local attackers to elevate privileges. Affected versions range from 5.14 to 6.6, potentially impacting all versions since 3.15. Various distributions are confirmed affected, with potential for more. Proof-of-concept code has been published, and successful exploitation may lead to arbitrary … Read more

CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw

May 30, 2024 at 02:09PM The U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlighted a high-severity security flaw in the Linux kernel (CVE-2024-1086) enabling local privilege escalation. Additionally, a security flaw in Check Point network gateway products (CVE-2024-24919) was added to the Known Exploited Vulnerabilities catalog. Federal agencies are urged to apply the latest fixes … Read more

Researchers Resurrect Spectre v2 Attack Against Intel CPUs

April 10, 2024 at 10:25AM VUSec cybersecurity group at VU Amsterdam university revealed a new form of the Spectre v2 attack targeting Intel processors. Named Branch History Injection (BHI), it bypasses hardware mitigations and can leak kernel memory on the latest Intel CPUs. Intel updated guidance on mitigations and plans to address BHI in future … Read more

Easy-to-use make-me-root exploit lands for recent Linux kernels. Get patching

March 29, 2024 at 05:50PM A Linux privilege-escalation exploit affecting kernel versions 5.14 to 6.6.14 has been detailed by bug hunter Notselwyn. Dubbed CVE-2024-1086, the flaw allows unauthorized root access, posing risks of damage and system control. Highly severe, it has been patched, prompting essential updates. Notselwyn’s PoC source code enables simple exploitation, underscoring the … Read more

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

March 29, 2024 at 07:09AM A vulnerability in the “wall” command of the util-linux package, tracked as CVE-2024-28085, allows unprivileged users to manipulate other users’ terminals on certain Linux distributions. This could lead to password leaks or clipboard alteration. Users are advised to update to util-linux version 2.40 to address this issue. Another vulnerability, CVE-2024-1086, … Read more