On 12/01/2018 22:38, Mark wrote: > Don't the OS kernel / BIOS / CPU updates just mitigate against Meltdown, > preventing applications (executing in ring3) from inferring content of > kernel memory (in ring0)?
AFAIU, the kernel work-around for Meltdown is /not/ mapping the kernel inside an application's virtual memory space. BIOS and CPU updates are the same. Intel makes a microcode update, and BIOS vendors integrate that to patch the CPU at boot. Is there a microcode update for Meltdown? I thought they were only mitigating Spectre. Regards. _______________________________________________ support-seamonkey mailing list support-seamonkey@lists.mozilla.org https://lists.mozilla.org/listinfo/support-seamonkey