The Spectre attack exposed processors to memory disclosure attacks. Manipulation of indirect kernel calls may allow side channel retrieval of memory content (Branch Target Injection). The Linux kernel was subsequently enhanced to mitigate this Variant II attack using the retpoline feature.
In my previous post I made brief mention of some new features in the 4.15 (well, technically, 4.14) Linux kernel, supporting encrypted volatile memory (RAM). Apart from a brief awareness of industry initiatives in this area, I hadn’t closely followed this development and so decided to take a look and write up some findings in… Read More »
News of a new vulnerability in the Linux kernel is worth reviewing (https://www.kb.cert.org/vuls/id/962459). The vulnerability affects kernels 4.9 and later, and can apparently be exploited by a remote attacker interacting with an open port. Patches are available.