[ZDNet] 今翅到ARM A系列中槍。
又係speculative execution嘅bug。行緊speculative execution個時就算instruction control flow有變仍然係記憶體到順序行instructions。"In a document [PDF] published on Monday, Arm says SLS is another form of the original Spectre vulnerability. [color=Red]While the original Spectre bug impacted CPUs from all major chipmakers, SLS impacts Arm Armv-A processors only.[/color]
On impacted processors, Arm says that while computing operations [color=Red]in advance part of the speculative execution process, when there's a change in the Arm CPU's instruction control flow, the CPU reacts by executing instructions found linearly in its memory, past the change in the control flow -- an unwanted scenario.[/color]"
[url]https://www.zdnet.com/article/arm-cpus-impacted-by-rare-side-channel-attack/[/url]
頁:
[1]