CPU Bugs: Difference between revisions
Jump to navigation
Jump to search
[unchecked revision] | [unchecked revision] |
Content deleted Content added
Added details of the recently publicised Intel x86 bug |
|||
Line 67: | Line 67: | ||
[http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif] |
[http://www.geek.com/images/geeknews/2006Jan/core_duo_errata__2006_01_21__full.gif] |
||
=== 'Meltdown' Page Table Bug === |
|||
Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/]. |
|||
== AMD == |
== AMD == |