Meltdown Side Channel Vulnerability Report
On affected systems, meltdown enables an adversary to read memory of other processes or virtual machines in the cloud without any permissions or privileges, affecting millions of customers and virtually every user of a personal computer. We show that the KAISER defense mechanism for KASLR has the important (but inadvertent) side effect of impeding meltdown. We stress that KAISER must be deployed immediately to prevent large-scale exploitation of this severe information leakage.
Read more about “Meltdown Side Channel Vulnerability Report” which can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/meltdown.pdf |