(no title)
teh | 6 years ago
This version removed direct access "Date" [2] but I'm not sure I'd trust any code running in the same process space given how hard it is to fix spectre in general.
[1] https://github.com/google/caja/wiki/SES#current-date-and-tim...
[2] https://github.com/Agoric/SES/tree/master/demo#taming-dateno...
saurik|6 years ago
colejohnson66|6 years ago
Can someone ELI5 how a separate process would fix Spectre/Meltdown?
blattimwind|6 years ago
Meltdown is similar, but because a CPU affected by Meltdown does not perform permission checks during speculative execution, you can read memory that the execution environment doesn't even have permissions for. E.g. kernel memory.
The fix for Spectre is thus to only consider address spaces a security boundary; interpreters or JITs cannot be considerd security boundaries any more (in general).