When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    The vulnerability is known to affect Skylake and later processors from Intel and Zen-based processors from AMD. [ 54 ] In February 2023, a team of researchers at North Carolina State University uncovered a new code execution vulnerability called Spectre-HD, also known as "Spectre SRV" or "Spectre v6".

  3. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    [45] [46] It affects certain ARM64 CPUs [47] and the following Intel CPU families: Cascade Lake, Ice Lake, Tiger Lake and Alder Lake. According to Linux kernel developers AMD CPUs are also affected. [48] In March 2022, a vulnerability affecting a wide range of AMD CPUs was disclosed under CVE-2021-26341. [49] [50]

  4. List of discontinued x86 instructions - Wikipedia

    en.wikipedia.org/wiki/List_of_discontinued_x86...

    The LWPINS instruction sets CF=1 if LWP is enabled and the ring buffer is full, CF=0 otherwise. LWPVAL r32/64, r/m32, imm32: XOP.A 12 /1 imm32: Decrement the event counter associated with the programmed value sample event. If the resulting counter value ends up negative, insert an event record with EventID=1 in LWP ring buffer.

  5. Microarchitectural Data Sampling - Wikipedia

    en.wikipedia.org/wiki/Microarchitectural_Data...

    The vulnerabilities are in the implementation of speculative execution, which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of reading data buffers found between different parts of the processor. [1] [2] [6] [7] Microarchitectural Store Buffer Data Sampling (MSBDS), CVE-2018-12126

  6. Circular buffer - Wikipedia

    en.wikipedia.org/wiki/Circular_buffer

    In computer science, a circular buffer, circular queue, cyclic buffer or ring buffer is a data structure that uses a single, fixed-size buffer as if it were connected end-to-end. This structure lends itself easily to buffering data streams. [1] There were early circular buffer implementations in hardware. [2] [3]

  7. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative execution exploit Variant 4, [8] is referred to as Speculative Store Bypass (SSB), [1] [9] and has been assigned CVE-2018-3639. [7] SSB is named Variant 4, but it is the fifth variant in the Spectre-Meltdown class of vulnerabilities.

  8. Intel microcode - Wikipedia

    en.wikipedia.org/wiki/Intel_Microcode

    The processor must be in protection ring zero ("Ring 0") in order to initiate a microcode update. [21]: 1 Each CPU in a symmetric multiprocessing arrangement needs to be updated individually. [21]: 1 An update is initiated by placing its address in eax register, setting ecx = 0x79, and executing a wrmsr (Write model-specific register).

  9. Raptor Lake - Wikipedia

    en.wikipedia.org/wiki/Raptor_Lake

    Raptor Lake CPUs have suffered issues with permanent damage from elevated voltage due to a vulnerable clock tree circuit, resulting in instability. Intel claims these issues have been since fixed in the latest microcode patches, which requires updating the motherboard's BIOS. [11] [12]