CPU Bugs: Difference between revisions

Jump to navigation Jump to search
[unchecked revision][unchecked revision]
Content deleted Content added
Zesterer (talk | contribs)
Added details of the recently publicised Intel x86 bug
Line 67: Line 67:


[http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif]
[http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif]

=== 'Meltdown' Page Table Bug ===

Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/].


== AMD ==
== AMD ==