Talk:Meltdown (security vulnerability): Difference between revisions
Appearance
Content deleted Content added
Assessment: Microsoft Windows: class=Start (assisted) |
|||
Line 8: | Line 8: | ||
Please merge this article with [[Kernel page-table isolation]]. -<span style="text-shadow:7px 5px 7px #409fff;">[[User:Mardus|Mardus]] <small>/[[User talk:Mardus|talk]]</small></span> 22:18, 3 January 2018 (UTC) |
Please merge this article with [[Kernel page-table isolation]]. -<span style="text-shadow:7px 5px 7px #409fff;">[[User:Mardus|Mardus]] <small>/[[User talk:Mardus|talk]]</small></span> 22:18, 3 January 2018 (UTC) |
||
:Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. [[User:Legoktm|Legoktm]] ([[User talk:Legoktm|talk]]) 23:46, 3 January 2018 (UTC) |
:Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. [[User:Legoktm|Legoktm]] ([[User talk:Legoktm|talk]]) 23:46, 3 January 2018 (UTC) |
||
::KPTI/KAISER was originally proposed primarily as an extremely broad (but potentially costly!) mitigation for [[KASLR]] bypass attacks. I believe it was proposed before Meltdown was discovered. Meltdown is much worse than a simple KASLR bypass, being able to outright read all mapped memory. KPTI/KAISER, being a very broad hammer, happens to stop the reading of kernel memory using the bug, and that is why it was actually adopted. [[Special:Contributions/184.176.111.201|184.176.111.201]] ([[User talk:184.176.111.201|talk]]) 00:33, 4 January 2018 (UTC) |
|||
== Where's Spectre == |
== Where's Spectre == |
Revision as of 00:33, 4 January 2018
![]() | Computing: Software Start‑class Mid‑importance | |||||||||||||||||||||||
|
![]() | Linux Start‑class Mid‑importance | |||||||||
|
![]() | Microsoft Windows: Computing Start‑class Mid‑importance | ||||||||||||
|
![]() | Apple Inc. Start‑class Mid‑importance | |||||||||
|
Merge request
Please merge this article with Kernel page-table isolation. -Mardus /talk 22:18, 3 January 2018 (UTC)
- Ideally this page would be about the Meltdown vulnterability, and KPTI would just be about the mitigation/feature? Though I'm not sure how different they both are. Legoktm (talk) 23:46, 3 January 2018 (UTC)
- KPTI/KAISER was originally proposed primarily as an extremely broad (but potentially costly!) mitigation for KASLR bypass attacks. I believe it was proposed before Meltdown was discovered. Meltdown is much worse than a simple KASLR bypass, being able to outright read all mapped memory. KPTI/KAISER, being a very broad hammer, happens to stop the reading of kernel memory using the bug, and that is why it was actually adopted. 184.176.111.201 (talk) 00:33, 4 January 2018 (UTC)
Where's Spectre
I don't see an article about Spectre (security bug) Artem-S-Tashkinov (talk) 23:59, 3 January 2018 (UTC)
Categories:
- Start-Class Computing articles
- Mid-importance Computing articles
- Start-Class software articles
- Mid-importance software articles
- Start-Class software articles of Mid-importance
- All Software articles
- Start-Class Computer hardware articles
- High-importance Computer hardware articles
- Start-Class Computer hardware articles of High-importance
- Start-Class Computer Security articles
- High-importance Computer Security articles
- Start-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- Start-Class Linux articles
- Mid-importance Linux articles
- WikiProject Linux articles
- Start-Class Microsoft Windows articles
- Mid-importance Microsoft Windows articles
- Unknown-importance Computing articles
- WikiProject Microsoft Windows articles
- Start-Class Apple Inc. articles
- Mid-importance Apple Inc. articles
- WikiProject Apple Inc. articles