[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Huge Intel CPU Bug Allegedly Causes Kernel Memory Vulnerability With Up To 30% Performance Hit



However this is not just Intel. AMD, ARM and others are also affected by spectre attack[0]. And this one is much more harder to mitigate.
There are already available patches, so roll out security updates and stay tuned.

[0]: https://spectreattack.com/

-- 
Kind regards,
Rushan.



03.01.2018, 18:53, "Pavel Alyev" <aliech@aliech.ru>:
> It's main reason why coreboot developers recommend to include LATEST
> microcode patch in build of BIOS image.
>
> And if this can't be fixed... Nothing happened. There is many bugs in
> CPUs. And kernel have workarounds for this. Look on non x86 sources.
> Look on huge errata's lists of ARM, for example. It's normal practice.
>
> 03.01.2018 13:43, Vincent Deffontaines пишет:
>>  Greetings,
>>
>>  And happy new year.
>>
>>  This is hitting all of us soon.
>>  In short : a huge (and long lasting) hardware bug, present in about
>>  all Intel CPUs that have been sold for the last 10 years.
>>  It is not fixable by microcode, and requires ugly patching from the
>>  kernel layer. Other OSes such as Microsoft are concerned as well.
>>
>>  Nice overview of the thing :
>>  https://hothardware.com/news/intel-cpu-bug-kernel-memory-isolation-linux-windows-macos
>>
>>  More detail :
>>  http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
>>
>>  Linus' patch :
>>  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5aa90a84589282b87666f92b6c3c917c8080a9bf
>>
>>  Vincent Deffontaines
>
> --
> With best regards


Reply to: