![]() ![]() At the time of disclosure (2018), this included all devices running any but the most recent and patched versions of iOS, Linux, macOS, or Windows. Meltdown affects a wide range of systems. It allows a rogue process to read all memory, even when it is not authorized to do so. ![]() ![]() Meltdown affects Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors. Meltdown is one of the two original transient execution CPU vulnerabilities (the other being Spectre). Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors The logo used by the team that discovered the vulnerability ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |