When.com Web Search

  1. Ads

    related to: windows kernel information disclosure vulnerability

Search results

  1. Results From The WOW.Com Content Network
  2. SWAPGS (security vulnerability) - Wikipedia

    en.wikipedia.org/.../SWAPGS_(security_vulnerability)

    SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. [1] [2] [3] Most processors use a form of speculative execution, this feature allows the processors to make educated guesses about the instructions that will most likely need to be executed in the near future.

  3. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  4. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    Linux kernel developers chose not to add mitigations citing performance concerns. [72] The Xen hypervisor project released patches to mitigate the vulnerability but they are not enabled by default. [73] Also in March 2024, a vulnerability in Intel Atom processors called Register File Data Sampling (RFDS) was revealed. [74] It was assigned CVE ...

  5. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    Since the disclosure of Spectre and Meltdown in January 2018, much research had been done on vulnerabilities related to speculative execution. On 3 May 2018, eight additional Spectre-class flaws provisionally named Spectre-NG by c't (a German computer magazine) were reported affecting Intel and possibly AMD and ARM processors. Intel reported ...

  6. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities. [1] It affects the ARM, AMD and Intel families of processors.

  7. Duqu - Wikipedia

    en.wikipedia.org/wiki/Duqu

    Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm [1] and to have been created by Unit 8200. [2] [3] Duqu has exploited Microsoft Windows's zero-day vulnerability.

  8. Control-flow integrity - Wikipedia

    en.wikipedia.org/wiki/Control-flow_integrity

    As of Windows 10 Creators Update (Windows 10 version 1703), the Windows kernel is compiled with CFG. [21] The Windows kernel uses Hyper-V to prevent malicious kernel code from overwriting the CFG bitmap. [22] CFG operates by creating a per-process bitmap, where a set bit indicates that the address is a valid destination. Before performing each ...

  9. BlueKeep - Wikipedia

    en.wikipedia.org/wiki/BlueKeep

    The BlueKeep security vulnerability was first noted by the UK National Cyber Security Centre [2] and, on 14 May 2019, reported by Microsoft. The vulnerability was named BlueKeep by computer security expert Kevin Beaumont on Twitter. BlueKeep is officially tracked as: CVE-2019-0708 and is a "wormable" remote code execution vulnerability. [5] [6]