- 主题:amd的meltdown来了
怎么办,急急急
Update, 8/31/2021 7:30am PT: Updated article and title to clarify that the vulnerability applies to all AMD processors, not just the Zen 2 and Zen+ models listed in the research paper.
Original article:
According to security researchers and AMD, the company's Zen 2 and Zen+ processors suffer from a new Meltdown-like vulnerability, but the problem appears to be far more wide-ranging. AMD has prepared a guide on mitigating the vulnerability and published details about how the vulnerability works, but the company's security bulletin also notes that all AMD CPUs are vulnerable. Called "Transient Execution of Non-canonical Accesses," this vulnerability acts very similarly to the already-disclosed Meltdown vulnerability that only impacts Intel CPUs.
- 来自「最水木 for iPhone13,3」
--
FROM 24.35.90.*
Should you be worried? Probably not. In the whitepaper, the researchers did note that "AMD's design decisions indeed limit the exploitability scope" when compared to Meltdown-style attack vectors affecting Intel's CPUs, "yet it may be possible to use them to amplify other microarchitectural attacks."
Additionally, AMD's mitigation is for software vendors to review their code for any possible security holes related to this, adding that "potential vulnerabilities can be addressed by inserting an LFENCE or using existing speculation mitigation techniques."
On the user side of things, it sounds like the best thing to be done is to stay up to date with the latest patches.
【 在 shallpi0n (紫竹) 的大作中提到: 】
: 怎么办,急急急
: Update, 8/31/2021 7:30am PT: Updated article and title to clarify that the vulnerability applies to all AMD processors, not just the Zen 2 and Zen+ models listed in the research paper.
: Original article:
: ...................
--
FROM 73.63.245.*
屁大点事
--
FROM 60.176.30.*
【 在 shallpi0n 的大作中提到: 】
: 怎么办,急急急
: Update, 8/31/2021 7:30am PT: Updated article and title to clarify that the vulnerability applies to all AMD processors, not just the Zen 2 and Zen+ models listed in the research paper.
: Original article:
: ...................
我靠,射射发抖,这要缩杠了啊?我很有理由怀疑,AMD在使坏,故意在新U要发布时机给老U打补丁
--
FROM 59.39.244.*
本青一安装完系统就在内核启动参数里面加 nosmt
【 在 zhaoyi821103 (ShenzhenXiaoyi) 的大作中提到: 】
: 我靠,射射发抖,这要缩杠了啊?我很有理由怀疑,AMD在使坏,故意在新U要发布时机给老U打补丁
--
FROM 117.24.207.*
在BIOS里关了超线程多完美
【 在 hgoldfish 的大作中提到: 】
: 本青一安装完系统就在内核启动参数里面加 nosmt
:
--
FROM 111.192.183.*
楼主这种行为就像IPV4天天说地址告急,1999年的记者天天说计算机要千年虫
【 在 Avocado 的大作中提到: 】
: Should you be worried? Probably not. In the whitepaper, the researchers did note that "AMD's design decisions indeed limit the exploitability scope" when compared to Meltdown-style attack vectors affecting Intel's CPUs, "yet it may be possible to use them to amplify other microarchitectural attacks."
: Additionally, AMD's mitigation is for software vendors to review their code for any possible security holes related to this, adding that "potential vulnerabilities can be addressed by inserting an LFENCE or using existing speculation mitigation techniques."
: On the user side of things, it sounds like the best thing to be done is to stay up to date with the latest patches.
: ...................
--
FROM 111.192.183.*
嗯,地球是有储量只够xx年
【 在 myspam (mys/梅艳珊/珊珊/Pam/帕姆) 的大作中提到: 】
: 楼主这种行为就像IPV4天天说地址告急,1999年的记者天天说计算机要千年虫
--
FROM 183.208.183.*
【 在 myspam 的大作中提到: 】
: 在BIOS里关了超线程多完美
我从来不开超线程
从这玩意诞生的那一天开始,就一直不开
--
FROM 111.206.145.*
某些方面有提升,为什么不开?
【 在 leslin 的大作中提到: 】
:
: 我从来不开超线程
: 从这玩意诞生的那一天开始,就一直不开
--
FROM 111.192.183.*