<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">so, does this mean that the UEFI might get patched first? OR, does the OS ecology have to do so first? Lastly, how much of a performance hit will this represent?<div><br></div><div>-eric</div><div>from the central offices of the Technomage Guild, the "oh look! yet another bug!" Dept.</div><div><br><div><div>On Jan 2, 2018, at 3:39 PM, Matthew Crews wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite"><br><a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/</a><br><br>In a nutshell, it is a major security flaw in Intel hardware dating back a decade that is requiring a complete kernel rewrite for every major OS (Linux, Windows, Mac, etc) in order to patch out. It cannot be patched out with a CPU microcode update. Major enough that code comments are redacted in the patches until an embargo period is expired. Also the reported fix will have a huge performance impact.<br><br>Also crucial to note is that AMD chips are not affected by this.<br><br>How the heck does something like this go unnoticed for so long?<br><br><br><br><br>Sent from <a href="https://protonmail.com/">ProtonMail</a>, Swiss-based encrypted email.<br><br><br><br><br>---------------------------------------------------<br>PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org<br>To subscribe, unsubscribe, or to change your mail settings:<br>http://lists.phxlinux.org/mailman/listinfo/plug-discuss</blockquote></div><br></div></body></html>