{"id":7585,"date":"2019-11-14T08:44:09","date_gmt":"2019-11-14T01:44:09","guid":{"rendered":"https:\/\/www.hostatom.com\/content\/?p=7585"},"modified":"2024-09-04T15:07:03","modified_gmt":"2024-09-04T08:07:03","slug":"%e0%b8%9e%e0%b8%9a%e0%b8%81%e0%b8%b2%e0%b8%a3%e0%b9%82%e0%b8%88%e0%b8%a1%e0%b8%95%e0%b8%b5-zombieload-v2-%e0%b8%9a%e0%b8%99%e0%b8%8b%e0%b8%b5%e0%b8%9e%e0%b8%b5%e0%b8%a2%e0%b8%b9-intel-%e0%b9%81","status":"publish","type":"post","link":"https:\/\/www.hostatom.com\/content\/7585\/","title":{"rendered":"\u0e1e\u0e1a\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35 ZombieLoad v2 \u0e1a\u0e19\u0e0b\u0e35\u0e1e\u0e35\u0e22\u0e39 Intel \u0e41\u0e19\u0e30\u0e19\u0e33\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e2d\u0e31\u0e1b\u0e40\u0e14\u0e15\u0e14\u0e48\u0e27\u0e19"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7585\" class=\"elementor elementor-7585\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1722b9ba e-flex e-con-boxed e-con e-parent\" data-id=\"1722b9ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0ca992 elementor-widget elementor-widget-text-editor\" data-id=\"6b0ca992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u0e19\u0e31\u0e01\u0e27\u0e34\u0e08\u0e31\u0e22\u0e44\u0e14\u0e49\u0e1e\u0e1a\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35 <a href=\"https:\/\/zombieloadattack.com\/\">ZombieLoad v2<\/a> \u0e41\u0e2e\u0e01\u0e40\u0e01\u0e2d\u0e23\u0e4c\u0e08\u0e30\u0e43\u0e0a\u0e49\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e08\u0e32\u0e01\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35\u0e40\u0e02\u0e49\u0e32\u0e02\u0e42\u0e21\u0e22\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e17\u0e35\u0e48\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e1a\u0e19\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e44\u0e14\u0e49\u0e2b\u0e21\u0e32\u0e22\u0e40\u0e25\u0e02\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e19\u0e35\u0e49\u0e04\u0e37\u0e2d CVE-2019-11135 \u0e0b\u0e36\u0e48\u0e07\u0e21\u0e35\u0e1c\u0e25\u0e01\u0e23\u0e30\u0e17\u0e1a\u0e01\u0e31\u0e1a desktops, laptops, \u0e41\u0e25\u0e30 cloud computers \u0e17\u0e35\u0e48\u0e23\u0e2d\u0e07\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19 TSX (Transactional Synchronization Extensions) \u0e1a\u0e19\u0e0b\u0e35\u0e1e\u0e35\u0e22\u0e39 Intel \u0e23\u0e27\u0e21\u0e44\u0e1b\u0e16\u0e36\u0e07 Core, Xeon processors, \u0e41\u0e25\u0e30 Cascade Lake\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6b9b34 elementor-widget elementor-widget-text-editor\" data-id=\"e6b9b34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u0e17\u0e32\u0e07 Intel \u0e44\u0e14\u0e49\u0e02\u0e2d\u0e43\u0e2b\u0e49\u0e19\u0e31\u0e01\u0e27\u0e34\u0e08\u0e31\u0e22\u0e2d\u0e22\u0e48\u0e32\u0e40\u0e1b\u0e34\u0e14\u0e40\u0e1c\u0e22\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e02\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35\u0e08\u0e19\u0e01\u0e27\u0e48\u0e32\u0e08\u0e30\u0e2d\u0e2d\u0e01\u0e41\u0e1e\u0e15\u0e0a\u0e4c\u0e2d\u0e38\u0e14\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e19\u0e35\u0e49 \u0e0b\u0e36\u0e48\u0e07\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e14\u0e32\u0e27\u0e19\u0e4c\u0e42\u0e2b\u0e25\u0e14\u0e41\u0e1e\u0e15\u0e0a\u0e4c\u0e2d\u0e31\u0e1b\u0e40\u0e14\u0e15\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48 <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00270.html\">Security Center \u0e02\u0e2d\u0e07 Intel<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a134abd elementor-widget elementor-widget-text-editor\" data-id=\"a134abd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u0e17\u0e35\u0e48\u0e21\u0e32: <a href=\"https:\/\/thehackernews.com\/2019\/11\/zombieload-cpu-vulnerability.html\">The Hacker News<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u0e19\u0e31\u0e01\u0e27\u0e34\u0e08\u0e31\u0e22\u0e44\u0e14\u0e49\u0e1e\u0e1a\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35 ZombieLoad v2 \u0e41\u0e2e\u0e01\u0e40\u0e01\u0e2d\u0e23\u0e4c\u0e08\u0e30\u0e43\u0e0a\u0e49\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e08\u0e32\u0e01\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35\u0e40\u0e02\u0e49\u0e32\u0e02\u0e42\u0e21\u0e22\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e17\u0e35\u0e48\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e1a\u0e19\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e44\u0e14\u0e49\u0e2b\u0e21\u0e32\u0e22\u0e40\u0e25\u0e02\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e19\u0e35\u0e49\u0e04\u0e37\u0e2d CVE-2019-11135 \u0e0b\u0e36\u0e48\u0e07\u0e21\u0e35\u0e1c\u0e25\u0e01\u0e23\u0e30\u0e17\u0e1a\u0e01\u0e31\u0e1a desktops, laptops, \u0e41\u0e25\u0e30 cloud computers \u0e17\u0e35\u0e48\u0e23\u0e2d\u0e07\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19 TSX (Transactional Synchronization Extensions) \u0e1a\u0e19\u0e0b\u0e35\u0e1e\u0e35\u0e22\u0e39 Intel \u0e23\u0e27\u0e21\u0e44\u0e1b\u0e16\u0e36\u0e07 Core, Xeon processors, \u0e41\u0e25\u0e30 Cascade Lake\u0e17\u0e32\u0e07 Intel \u0e44\u0e14\u0e49\u0e02\u0e2d\u0e43\u0e2b\u0e49\u0e19\u0e31\u0e01\u0e27\u0e34\u0e08\u0e31\u0e22\u0e2d\u0e22\u0e48\u0e32\u0e40\u0e1b\u0e34\u0e14\u0e40\u0e1c\u0e22\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e02\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e42\u0e08\u0e21\u0e15\u0e35\u0e08\u0e19\u0e01\u0e27\u0e48\u0e32\u0e08\u0e30\u0e2d\u0e2d\u0e01\u0e41\u0e1e\u0e15\u0e0a\u0e4c\u0e2d\u0e38\u0e14\u0e0a\u0e48\u0e2d\u0e07\u0e42\u0e2b\u0e27\u0e48\u0e19\u0e35\u0e49 \u0e0b\u0e36\u0e48\u0e07\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e14\u0e32\u0e27\u0e19\u0e4c\u0e42\u0e2b\u0e25\u0e14\u0e41\u0e1e\u0e15\u0e0a\u0e4c\u0e2d\u0e31\u0e1b\u0e40\u0e14\u0e15\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48 Security Center \u0e02\u0e2d\u0e07 Intel\u0e17\u0e35\u0e48\u0e21\u0e32: The Hacker News<\/p>\n","protected":false},"author":2,"featured_media":58329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,12,6],"tags":[135],"class_list":["post-7585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","category-vulnerability","tag-intel"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/posts\/7585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/comments?post=7585"}],"version-history":[{"count":0,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/posts\/7585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/media\/58329"}],"wp:attachment":[{"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/media?parent=7585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/categories?post=7585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostatom.com\/content\/wp-json\/wp\/v2\/tags?post=7585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}