Bobinas P4G
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • People

Conversation

Notices

  1. eltuert0 (eltuert0@mastodon.social)'s status on Friday, 05-Jan-2018 15:48:44 UTC eltuert0 eltuert0

    AMD sobre Meltdown:

    Variant 1 "Bounds Check Bypass": Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.

    Variant 2 "Branch Target Injection": Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.

    Variant 3: "Rogue Data Cache Load": Zero AMD vulnerability due to AMD architecture differences.

    In conversation Friday, 05-Jan-2018 15:48:44 UTC from mastodon.social permalink
    • eltuert0 (eltuert0@mastodon.social)'s status on Friday, 05-Jan-2018 15:49:41 UTC eltuert0 eltuert0
      in reply to

      https://www.amd.com/en/corporate/speculative-execution

      In conversation Friday, 05-Jan-2018 15:49:41 UTC permalink

      Attachments


Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Bobinas P4G is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Bobinas P4G content and data are available under the Creative Commons Attribution 3.0 license.