The SSE5 extensions to the X64 instruction set are much more important than the virtualization announcement, and both are unquestionably less important--at least for now--than getting a competitive quad-core processor out the door to compete with Intel. Just like AMD took the bull by the horns and added 64-bit memory extensions to the X86 architecture years ahead of Intel, with the SSE5 extensions AMD is going to take the SSE instruction set developed for 32-bit X86 and 64-bit X64 processors by Intel and extend them. The SSE5 specs are also being put out there for all to see, and they include special instructions for number-crunching, media processing, and memory operations that substantially speed up the performance of applications.
SSE is Intelspeak for Streaming SIMD Extensions, and SIMD is short for Single Instruction Multiple Data. Intel introduced SSE in 1999 with its Pentium III processors, and it was a direct response to the multimedia extensions called 3DNow that AMD created for its Athlon processors. Intel has currently put forth a set of instructions called SSE4, which will appear in its future "Penryn" Core 2 processors later this year.
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment