https://www.theregister.co.uk/2018/0...u_design_flaw/
TLDR version: Massive security bug can't be patched in-processor, Windows, Linux (hence also MacOS) etc. speeds will all need to be patched which will result in double-digit % speed hits to all processors from the last decade.
FFFFFFFUUUUUUUUUUUUUU and I smell class-action lawsuit.
With that said, at least we got this out of it:
The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.