| Display title | Speculative Store Bypass |
| Default sort key | Speculative Store Bypass |
| Page length (in bytes) | 13,526 |
| Namespace ID | 0 |
| Page ID | 236854 |
| Page content language | en - English |
| Page content model | wikitext |
| Indexing by robots | Allowed |
| Number of redirects to this page | 0 |
| Counted as a content page | Yes |
| HandWiki item ID | None |
| Edit | Allow all users (infinite) |
| Move | Allow all users (infinite) |
| Page creator | imported>Carolyn |
| Date of page creation | 19:44, 9 May 2022 |
| Latest editor | imported>Carolyn |
| Date of latest edit | 19:44, 9 May 2022 |
| Total number of edits | 1 |
| Recent number of edits (within past 90 days) | 0 |
| Recent number of distinct authors | 0 |
Description | Content |
Article description: (description) This attribute controls the content of the description and og:description elements. | Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities. It affects the ARM, AMD and Intel families of processors. It... |