Re: Huge Intel CPU Bug Allegedly Causes Kernel Memory Vulnerability With Up To 30% Performance Hit
However this is not just Intel. AMD, ARM and others are also affected by spectre attack[0]. And this one is much more harder to mitigate.
There are already available patches, so roll out security updates and stay tuned.
[0]: https://spectreattack.com/
--
Kind regards,
Rushan.
03.01.2018, 18:53, "Pavel Alyev" <aliech@aliech.ru>:
> It's main reason why coreboot developers recommend to include LATEST
> microcode patch in build of BIOS image.
>
> And if this can't be fixed... Nothing happened. There is many bugs in
> CPUs. And kernel have workarounds for this. Look on non x86 sources.
> Look on huge errata's lists of ARM, for example. It's normal practice.
>
> 03.01.2018 13:43, Vincent Deffontaines пишет:
>> Greetings,
>>
>> And happy new year.
>>
>> This is hitting all of us soon.
>> In short : a huge (and long lasting) hardware bug, present in about
>> all Intel CPUs that have been sold for the last 10 years.
>> It is not fixable by microcode, and requires ugly patching from the
>> kernel layer. Other OSes such as Microsoft are concerned as well.
>>
>> Nice overview of the thing :
>> https://hothardware.com/news/intel-cpu-bug-kernel-memory-isolation-linux-windows-macos
>>
>> More detail :
>> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
>>
>> Linus' patch :
>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5aa90a84589282b87666f92b6c3c917c8080a9bf
>>
>> Vincent Deffontaines
>
> --
> With best regards
Reply to: