CPU Bugs: Difference between revisions

Jump to navigation Jump to search
[unchecked revision][unchecked revision]
Content deleted Content added
Zesterer (talk | contribs)
Added details of the recently publicised Intel x86 bug
Zesterer (talk | contribs)
mNo edit summary
Line 70: Line 70:
=== 'Meltdown' Page Table Bug ===
=== 'Meltdown' Page Table Bug ===


Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/].
Modern (1995 and upwards) Intel x86 chips contain a bug in the out-of-order execution hardware that allows unprivileged userland software to gain access to kernel memory when the kernel is mapped into the userland address space. To avoid vulnerability, it is recommended that the kernel and userland page tables remain separate (i.e: PTI, Page Table Isolation). For more details, visit [https://spectreattack.com/ this page].


== AMD ==
== AMD ==