{"id":533,"date":"2024-04-10T11:25:19","date_gmt":"2024-04-10T11:25:19","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/10\/researchers-uncover-first-native-spectre-v2-exploit-against-linux-kernel\/"},"modified":"2024-04-10T11:25:19","modified_gmt":"2024-04-10T11:25:19","slug":"researchers-uncover-first-native-spectre-v2-exploit-against-linux-kernel","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/10\/researchers-uncover-first-native-spectre-v2-exploit-against-linux-kernel\/","title":{"rendered":"Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel"},"content":{"rendered":"<p>\u200bCybersecurity researchers have disclosed what they say is the &#8220;first native Spectre v2 exploit&#8221; against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory.<br \/>\nThe exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB\/sec by bypassing existing Spectre v2\/BHI mitigations, researchers from Systems and\u00a0Cybersecurity researchers have disclosed what they say is the &#8220;first native Spectre v2 exploit&#8221; against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory.<br \/>\nThe exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB\/sec by bypassing existing Spectre v2\/BHI mitigations, researchers from Systems and\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have disclosed what they say is the &#8220;first native Spectre v2 exploit&#8221; against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory. The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB\/sec by bypassing existing Spectre&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/10\/researchers-uncover-first-native-spectre-v2-exploit-against-linux-kernel\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":534,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/533"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=533"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/533\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/534"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}