Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2019-08-08 15:08:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] Grand Schemozzle: Spectre continues to haunt
The Spectre v1 hardware vulnerability is
often characterized as
allowing array bounds checks to be bypassed via speculative execution.
While that is true, it is not the full extent of the shenanigans allowed by
this particular class of vulnerabilities. For a demonstration of that
fact, one need look no further than the "SWAPGS vulnerability" known as
CVE-2019-1125 to the wider world or as "Grand Schemozzle" to the select
group of developers who addressed it in the Linux kernel.


(Читать комментарии) (Добавить комментарий)