When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    The vulnerability is known to affect Skylake and later processors from Intel and Zen-based processors from AMD. [54] In February 2023, a team of researchers at North Carolina State University uncovered a new code execution vulnerability called Spectre-HD, also known as "Spectre SRV" or "Spectre v6".

  3. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    In July 2023 a critical vulnerability in the Zen 2 AMD microarchitecture called Zenbleed was made public. [59] AMD released a microcode update to fix it. [60] In August 2023 a vulnerability in AMD's Zen 1, Zen 2, Zen 3, and Zen 4 microarchitectures called Inception [61] [62] was revealed and assigned CVE-2023-20569. According to AMD it is not ...

  4. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative execution exploit Variant 4, [8] is referred to as Speculative Store Bypass (SSB), [1] [9] and has been assigned CVE-2018-3639. [7] SSB is named Variant 4, but it is the fifth variant in the Spectre-Meltdown class of vulnerabilities.

  5. Chinese hackers exploited bug to compromise internet ... - AOL

    www.aol.com/news/chinese-hackers-exploited-bug...

    Versa Networks issued an advisory on Monday acknowledging that the vulnerability had been exploited "in at least one known instance" by an advanced group of hackers, and urged customers to update ...

  6. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  7. Software Guard Extensions - Wikipedia

    en.wikipedia.org/wiki/Software_Guard_Extensions

    In 2022, security researchers discovered a vulnerability in the Advanced Programmable Interrupt Controller (APIC) that allows for an attacker with root/admin privileges to gain access to encryption keys via the APIC by inspecting data transfers from L1 and L2 cache. [40] This vulnerability is the first architectural attack discovered on x86 CPUs.

  8. Foreshadow - Wikipedia

    en.wikipedia.org/wiki/Foreshadow

    Foreshadow, known as L1 Terminal Fault (L1TF) by Intel, [1] [2] is a vulnerability that affects modern microprocessors that was first discovered by two independent teams of researchers in January 2018, but was first disclosed to the public on 14 August 2018. [18]

  9. Lazy FP state restore - Wikipedia

    en.wikipedia.org/wiki/Lazy_FP_state_restore

    Lazy FPU state leak (CVE-2018-3665), also referred to as Lazy FP State Restore [1] or LazyFP, [2] [3] is a security vulnerability affecting Intel Core CPUs. [1] [4] The vulnerability is caused by a combination of flaws in the speculative execution technology present within the affected CPUs [1] and how certain operating systems handle context switching on the floating point unit (FPU). [2]