[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Regarding meltdown/spectre

From: Thomas Bushnell, BSG
Subject: Re: Regarding meltdown/spectre
Date: Sun, 04 Feb 2018 02:43:09 +0000

It's worth keeping in mind that there are very likely important security bugs far more dangerous than rowhammer-style attacks in Mach, let alone the Hurd. Security-critical applications should be pretty cautious.

On Sat, Feb 3, 2018 at 7:18 AM Samuel Thibault <address@hidden> wrote:

Jonathan Sélea, on sam. 03 févr. 2018 11:59:40 +0100, wrote:
> How much is HURD affected by the Meltdown/Spectre bugs that has gotten
> alot of attention lately?

Just like about any OS that tries to optimize at least a bit: meltdown
allows to read all of the main memory.

There is a meltdown gnumach branch to mitigate that part, but my time
has been caught by the need for upstreaming glibc.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]