Skip to content
This repository was archived by the owner on Dec 4, 2023. It is now read-only.

V8 6.3 exposes its users to the Meltdown and Spectre attacks if used for executing untrusted code #255

Closed
ignisf opened this issue Jan 4, 2018 · 6 comments · Fixed by #258

Comments

@ignisf
Copy link
Collaborator

ignisf commented Jan 4, 2018

As far as I understand, the following conditions need to be met:

  1. You have to be using V8 to run untrusted code.
  2. You have to be running V8 on an unpatched OS.

Mitigations have been merged in 6.4 beta, see:

@ignisf
Copy link
Collaborator Author

ignisf commented Jan 4, 2018

@seanmakesgames, @SamSaffron ^

@ignisf ignisf changed the title V8 6.3 exposes its users to the Meltdown and Spectre attacks V8 6.3 exposes its users to the Meltdown and Spectre attacks if used for executing untrusted code Jan 4, 2018
@seanmakesgames
Copy link

whoops all I use v8 for is executing untrusted code -- @ignisf is this a 6.3 and below or a 6.3 bug?

@ignisf
Copy link
Collaborator Author

ignisf commented Jan 4, 2018

looking at the patches, it relies on wasm... so I suspect it's since wasm was introduced. :/

@seanmakesgames
Copy link

Excellent. I don't support wasm, so as long as I keep that layer secure things are harder. I have a group of players trying to break it as well, they have some concerns with getting it to work in js, so we'll see how it goes. :)

@SamSaffron
Copy link
Contributor

Yeah let's keep this open till 6.4 is released, but the vuls have been in place for a very long time.

Keep in mind that OS patches will also "fix" this without a 6.4 upgrade and long term a CPU upgrade will fix this as well.

@YurySolovyov
Copy link

V8 6.7 is out by now with Untrusted code mitigations

@ignisf ignisf added this to the 6.7 milestone Jun 21, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants