
On Wed, Jan 03, 2018 at 09:38:25AM +1300, Lawrence D'Oliveiro wrote:
A pretty serious-sounding security hole has been found in recent Intel CPUs, which will require performance-sapping workarounds in both Linux and Windows to fix <http://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/>. The details are not public yet, but AMD, in its announcement that its products are not affected, would seem to have divulged some important clues.
Now announced as Meltdown and Spectre. Meltdown affects Intel only but Spectre potentially affects all superscalar CPUs and has been verified on Intel, AMD and ARM. See
Some more news bits: - Google Says Almost All CPUs Since 1995 Vulnerable To 'Meltdown' And 'Spectre' Flaws https://tech.slashdot.org/story/18/01/04/0524234 - By Next Week, Intel Expects To Issue Updates To More Than 90% of Processor Products Introduced Within Past Five Years https://it.slashdot.org/story/18/01/04/1839246 - Microsoft Issues Rare Out-of-Band Emergency Windows Update For Processor Security Bugs https://tech.slashdot.org/story/18/01/04/0536204 - Intel Memory Access Design Flaw Partially Addressed by Apple in macOS 10.13.2 [Unconfirmed] https://apple.slashdot.org/story/18/01/04/0540214 Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 858-5174 http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/