Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> But the positive news is that v1 & v2 only matter at all if you do in-process sandboxing of untrusted code.

I don't think this is accurate. It seems to be a widespread misunderstanding that started because the original proof of concept was within a single process. Spectre, before mitigations, allowed userspace to read kernel memory if appropriate gadgets in the kernel could be identified and exploited.

My understanding is the impact is only intra-process after mitigations.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: