Jump to content

Talk:Meltdown (security vulnerability): Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Assessment: Microsoft Windows: class=Start (assisted)
Line 8: Line 8:
Please merge this article with [[Kernel page-table isolation]]. -<span style="text-shadow:7px 5px 7px #409fff;">[[User:Mardus|Mardus]] <small>/[[User talk:Mardus|talk]]</small></span> 22:18, 3 January 2018 (UTC)
Please merge this article with [[Kernel page-table isolation]]. -<span style="text-shadow:7px 5px 7px #409fff;">[[User:Mardus|Mardus]] <small>/[[User talk:Mardus|talk]]</small></span> 22:18, 3 January 2018 (UTC)
:Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. [[User:Legoktm|Legoktm]] ([[User talk:Legoktm|talk]]) 23:46, 3 January 2018 (UTC)
:Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. [[User:Legoktm|Legoktm]] ([[User talk:Legoktm|talk]]) 23:46, 3 January 2018 (UTC)
::KPTI/KAISER was originally proposed primarily as an extremely broad (but potentially costly!) mitigation for [[KASLR]] bypass attacks. I believe it was proposed before Meltdown was discovered. Meltdown is much worse than a simple KASLR bypass, being able to outright read all mapped memory. KPTI/KAISER, being a very broad hammer, happens to stop the reading of kernel memory using the bug, and that is why it was actually adopted. [[Special:Contributions/184.176.111.201|184.176.111.201]] ([[User talk:184.176.111.201|talk]]) 00:33, 4 January 2018 (UTC)


== Where's Spectre ==
== Where's Spectre ==

Revision as of 00:33, 4 January 2018

WikiProject iconComputing: Software Start‑class Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
MidThis article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Software (assessed as Mid-importance).
Taskforce icon
This article is supported by Computer hardware task force (assessed as High-importance).
Taskforce icon
This article is supported by WikiProject Computer Security (assessed as High-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconLinux Start‑class Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Linux, a collaborative effort to improve the coverage of Linux on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
MidThis article has been rated as Mid-importance on the project's importance scale.
WikiProject iconMicrosoft Windows: Computing Start‑class Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Microsoft Windows, a collaborative effort to improve the coverage of Microsoft Windows on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
MidThis article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
WikiProject iconApple Inc. Start‑class Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Apple Inc., a collaborative effort to improve the coverage of Apple, Mac, iOS and related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
MidThis article has been rated as Mid-importance on the project's importance scale.

Merge request

Please merge this article with Kernel page-table isolation. -Mardus /talk 22:18, 3 January 2018 (UTC)[reply]

Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. Legoktm (talk) 23:46, 3 January 2018 (UTC)[reply]
KPTI/KAISER was originally proposed primarily as an extremely broad (but potentially costly!) mitigation for KASLR bypass attacks. I believe it was proposed before Meltdown was discovered. Meltdown is much worse than a simple KASLR bypass, being able to outright read all mapped memory. KPTI/KAISER, being a very broad hammer, happens to stop the reading of kernel memory using the bug, and that is why it was actually adopted. 184.176.111.201 (talk) 00:33, 4 January 2018 (UTC)[reply]

Where's Spectre

I don't see an article about Spectre (security bug) Artem-S-Tashkinov (talk) 23:59, 3 January 2018 (UTC)[reply]