Results 1 to 10 of 11

Thread: Intel process security bug

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Senior Member
    Join Date
    Jan 2014
    Posts
    6,007

    Intel processor security bug

    https://www.theregister.co.uk/2018/0...u_design_flaw/

    TLDR version: Massive security bug can't be patched in-processor, Windows, Linux (hence also MacOS) etc. speeds will all need to be patched which will result in double-digit % speed hits to all processors from the last decade.

    FFFFFFFUUUUUUUUUUUUUU and I smell class-action lawsuit.

    With that said, at least we got this out of it:

    The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.
    Last edited by Yw-slayer; January 3rd, 2018 at 05:45 AM.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •