On 12/01/2018 22:38, Mark wrote:

> Don't the OS kernel / BIOS / CPU updates just mitigate against Meltdown, 
> preventing applications (executing in ring3) from inferring content of 
> kernel memory (in ring0)?

AFAIU, the kernel work-around for Meltdown is /not/ mapping the
kernel inside an application's virtual memory space.

BIOS and CPU updates are the same. Intel makes a microcode update,
and BIOS vendors integrate that to patch the CPU at boot.

Is there a microcode update for Meltdown? I thought they were only
mitigating Spectre.

Regards.

_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to