enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    Transient execution CPU vulnerabilities are vulnerabilities in which instructions, most often optimized using speculative execution, are executed temporarily by a microprocessor, without committing their results due to a misprediction or error, resulting in leaking secret data to an unauthorized party.

  3. Category:Transient execution CPU vulnerabilities - Wikipedia

    en.wikipedia.org/wiki/Category:Transient...

    Pages in category "Transient execution CPU vulnerabilities" The following 15 pages are in this category, out of 15 total. This list may not reflect recent changes .

  4. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    The vulnerability is known to affect Skylake and later processors from Intel and Zen-based processors from AMD. [54] In February 2023, a team of researchers at North Carolina State University uncovered a new code execution vulnerability called Spectre-HD, also known as "Spectre SRV" or "Spectre v6".

  5. Downfall (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Downfall_(security...

    It is a transient execution CPU vulnerability which relies on speculative execution of Advanced Vector Extensions (AVX) instructions to reveal the content of vector registers. [ 3 ] [ 4 ] Vulnerability

  6. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  7. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative execution exploit Variant 4, [8] is referred to as Speculative Store Bypass (SSB), [1] [9] and has been assigned CVE-2018-3639. [7] SSB is named Variant 4, but it is the fifth variant in the Spectre-Meltdown class of vulnerabilities. [7] Steps involved in exploit: [1] "Slowly" store a value at a memory location

  8. Retbleed - Wikipedia

    en.wikipedia.org/wiki/Retbleed

    Retbleed is a speculative execution attack on x86-64 and ARM processors, including some recent Intel and AMD chips. [1] [2] First made public in 2022, it is a variant of the Spectre vulnerability which exploits retpoline, which was a mitigation for speculative execution attacks.

  9. Foreshadow - Wikipedia

    en.wikipedia.org/wiki/Foreshadow

    Foreshadow, known as L1 Terminal Fault (L1TF) by Intel, [1] [2] is a vulnerability that affects modern microprocessors that was first discovered by two independent teams of researchers in January 2018, but was first disclosed to the public on 14 August 2018. [18]