20180106

An Update on AMD Processor Security

【外部リンク】
http://www.amd.com/en/corporate/speculative-execution

Google Project Zero (GPZ) Research Title Details
Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences.

--

注目の投稿

【重要】「クイック設定Web on Cloud」を使った「Aterm通知機能」サービス終了のお知らせ

【外部リンク】 https://www.aterm.jp/product/atermstation/info/2025/info0929.html 【重要】「クイック設定Web on Cloud」を使った「Aterm通知機能」サービス終了のお知らせ https://ww...

人気の投稿