Az AMD is sajtóhírben reagált a #ktpi/#fuckwit bugra

2018-01-04 07:31, hup.hu - Informatika

An Update on AMD Processor Security: https://t.co/9fz4HwW0Re AMD (@AMD) January 4, 2018 #onhup Az Intel után az AMD is sajtóhírt adott ki a #FUCKWIT/#KPTI hashtag-ek alatt kategorizált processzorbugra. Összefoglalva: Google Project Zero (GPZ) Research Title Details Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected. Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date. Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences. Részletek a bejelentésben.

Tovább »