Re: Major Intel Memory Vulnerability

Página superior
Adjuntos:
Obtener este mensaje como un correo
+ (text/plain)
+ (text/plain)
Eliminar este mensaje
Responder a este mensaje
Autor: der.hans
Fecha:  
A: Matthew Crews, Main PLUG discussion list
Asunto: Re: Major Intel Memory Vulnerability
Am 02. Jan, 2018 schwätzte Matthew Crews so:

moin moin,

thanks! I was just looking to see if there was an update on the story :).

http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table

ciao,

der.hans

> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
>
> In a nutshell, it is a major security flaw in Intel hardware dating back a decade that is requiring a complete kernel rewrite for every major OS (Linux, Windows, Mac, etc) in order to patch out. It cannot be patched out with a CPU microcode update. Major enough that code comments are redacted in the patches until an embargo period is expired. Also the reported fix will have a huge performance impact.
>
> Also crucial to note is that AMD chips are not affected by this.
>
> How the heck does something like this go unnoticed for so long?
>
> Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted email.


--
# https://www.LuftHans.com https://www.PhxLinux.org
# "Try not to become a man of success, but rather try to become a man
# of value" -- Albert Einstein---------------------------------------------------
PLUG-discuss mailing list -
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss