enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    Newer Intel microarchitectures as well as AMD starting with Zen 3 are not affected. The mitigations for the vulnerability decrease the performance of the affected Intel CPUs by up to 39%, while AMD CPUs lose up to 14%. In August 2022, the SQUIP vulnerability was disclosed affecting Ryzen 2000–5000 series CPUs. [52]

  3. Downfall (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Downfall_(security...

    Intel promised microcode updates to resolve the vulnerability. [1] The microcode patches have been shown to significantly reduce the performance of some heavily-vectorized loads. [7] Patches to mitigate the effects of the vulnerability have also been created as part of the forthcoming version 6.5 release of the Linux kernel. [8]

  4. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  5. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    The vulnerability is known to affect Skylake and later processors from Intel and Zen-based processors from AMD. [ 54 ] In February 2023, a team of researchers at North Carolina State University uncovered a new code execution vulnerability called Spectre-HD, also known as "Spectre SRV" or "Spectre v6".

  6. Microarchitectural Data Sampling - Wikipedia

    en.wikipedia.org/wiki/Microarchitectural_Data...

    According to varying reports, Intel processors dating back to 2011 [12] or 2008 [1] are affected, and the fixes may be associated with a performance drop. [ 13 ] [ 14 ] Intel reported that processors manufactured in the month before the disclosure have mitigations against the attacks.

  7. Retbleed - Wikipedia

    en.wikipedia.org/wiki/Retbleed

    According to the researchers, Retbleed mitigations require extensive changes to the system which results in up to 14% and 39% performance loss on Linux for affected AMD and Intel CPU respectively. [4] The PoC works against Intel Core 6th, 7th and 8th generation microarchitectures and AMD Zen 1, Zen 1+, and Zen 2 microarchitectures.

  8. Load value injection - Wikipedia

    en.wikipedia.org/wiki/Load_value_injection

    In theory, any processor affected by Meltdown may be vulnerable to LVI, [4] but as of March 2020, LVI is only known to affect Intel microprocessors. [2] Intel has published a guide to mitigating the vulnerability by using compiler technology, requiring existing software to be recompiled to add LFENCE memory barrier instructions at every ...

  9. Pentium FDIV bug - Wikipedia

    en.wikipedia.org/wiki/Pentium_FDIV_bug

    66 MHz Intel Pentium (sSpec=SX837) with the FDIV bug. The Pentium FDIV bug is a hardware bug affecting the floating-point unit (FPU) of the early Intel Pentium processors. Because of the bug, the processor would return incorrect binary floating point results when dividing certain pairs of high-precision numbers.