Article Image
Article Image
read
Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider’s infrastructure, it might be possible to steal data from other customers.
Main Links
Papers
Info from Google
Responses From Manifacturer
CPU Manifacturers
GPU Manifacturers
Responses from Software Companies/Mantainers
OS
Windows
- Windows 10 - Windows 10 - 2
- Windows Servers
- Windows client guidance
- Windows server guidance
- Additional info on security releases - Kaspersky - Sophos - Webroot
- Security guidance
Linux
- Linux
- XenProject
- Red Hat - On performance impact - On Xen - On virtualization - More
- Ubuntu - Ubuntu 2 - Ubuntu 3
- KAISER
- Debian
- Linux Kernel
- Linus Torvalds