CPU Bugs: Difference between revisions
Jump to navigation
Jump to search
[unchecked revision] | [unchecked revision] |
Content deleted Content added
Added details of the recently publicised Intel x86 bug |
mNo edit summary |
||
Line 70: | Line 70: | ||
=== 'Meltdown' Page Table Bug === |
=== 'Meltdown' Page Table Bug === |
||
Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/]. |
Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/ this page]. |
||
== AMD == |
== AMD == |