When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    In March 2024, a variant of Spectre-V1 attack called GhostRace was published. [70] It was claimed it affected all the major microarchitectures and vendors, including Intel, AMD and ARM. It was assigned CVE-2024-2193. AMD dismissed the vulnerability (calling it "Speculative Race Conditions (SRCs)") claiming that existing mitigations were enough ...

  3. Downfall (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Downfall_(security...

    Intel's Software Guard Extensions (SGX) security subsystem is also affected by this bug. [4]The Downfall vulnerability was discovered by the security researcher Daniel Moghimi, who publicly released information about the vulnerability in August 2023, after a year-long embargo period.

  4. Reptar (vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Reptar_(vulnerability)

    Reptar is a CPU vulnerability discovered in late 2023, affecting a number of recent families of Intel x86 CPUs. According to The Register, the following CPU families are vulnerable: Alder Lake, Raptor Lake and Sapphire Rapids. [1] The Reptar vulnerability relates to processing of x86 instruction prefixes in ways that lead to unexpected behavior ...

  5. Speculative execution CPU vulnerabilities - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    In March 2024, a variant of Spectre-V1 attack called GhostRace was published. [70] It was claimed it affected all the major microarchitectures and vendors, including Intel, AMD and ARM. It was assigned CVE-2024-2193. AMD dismissed the vulnerability (calling it "Speculative Race Conditions (SRCs)") claiming that existing mitigations were enough ...

  6. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  7. Hertzbleed - Wikipedia

    en.wikipedia.org/wiki/Hertzbleed

    The exploit has been verified to work against Intel and AMD processors, with Intel's security advisory stating that all Intel processors are affected. [7] Other processors using frequency scaling exist, but the attack has not been tested on them. Neither Intel nor AMD are planning to release microcode patches, instead advising to harden ...

  8. List of Intel Core processors - Wikipedia

    en.wikipedia.org/wiki/List_of_Intel_Core_processors

    The latest badge promoting the Intel Core branding. The following is a list of Intel Core processors.This includes Intel's original Core (Solo/Duo) mobile series based on the Enhanced Pentium M microarchitecture, as well as its Core 2- (Solo/Duo/Quad/Extreme), Core i3-, Core i5-, Core i7-, Core i9-, Core M- (m3/m5/m7/m9), Core 3-, Core 5-, and Core 7- Core 9-, branded processors.

  9. Raptor Lake - Wikipedia

    en.wikipedia.org/wiki/Raptor_Lake

    The HX processors only support: DDR5-4800 (DDR5-5600 for i7-13850HX and above), DDR4-3200. The processors are connected to PCHs using an OPIO 2.0 x8 interface, except for the HX series which uses a DMI 4.0 x8 interface. [29] Except for the HX series, the processor and PCH are packaged together on a multi-chip package.