You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 4, 2023. It is now read-only.
ignisf
changed the title
V8 6.3 exposes its users to the Meltdown and Spectre attacks
V8 6.3 exposes its users to the Meltdown and Spectre attacks if used for executing untrusted code
Jan 4, 2018
Excellent. I don't support wasm, so as long as I keep that layer secure things are harder. I have a group of players trying to break it as well, they have some concerns with getting it to work in js, so we'll see how it goes. :)
As far as I understand, the following conditions need to be met:
Mitigations have been merged in 6.4 beta, see:
v8/v8@a060a4f
https://chromium-review.googlesource.com/c/v8/v8/+/848921
https://sites.google.com/a/chromium.org/dev/Home/chromium-security/ssca
https://googleprojectzero.blogspot.bg/2018/01/reading-privileged-memory-with-side.html
https://spectreattack.com/
https://meltdownattack.com/
The text was updated successfully, but these errors were encountered: