However this is not just Intel. AMD, ARM and others are also affected by spectre attack[0]. And this one is much more harder to mitigate. There are already available patches, so roll out security updates and stay tuned.
[0]: https://spectreattack.com/ -- Kind regards, Rushan. 03.01.2018, 18:53, "Pavel Alyev" <[email protected]>: > It's main reason why coreboot developers recommend to include LATEST > microcode patch in build of BIOS image. > > And if this can't be fixed... Nothing happened. There is many bugs in > CPUs. And kernel have workarounds for this. Look on non x86 sources. > Look on huge errata's lists of ARM, for example. It's normal practice. > > 03.01.2018 13:43, Vincent Deffontaines пишет: >> Greetings, >> >> And happy new year. >> >> This is hitting all of us soon. >> In short : a huge (and long lasting) hardware bug, present in about >> all Intel CPUs that have been sold for the last 10 years. >> It is not fixable by microcode, and requires ugly patching from the >> kernel layer. Other OSes such as Microsoft are concerned as well. >> >> Nice overview of the thing : >> >> https://hothardware.com/news/intel-cpu-bug-kernel-memory-isolation-linux-windows-macos >> >> More detail : >> >> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table >> >> Linus' patch : >> >> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5aa90a84589282b87666f92b6c3c917c8080a9bf >> >> Vincent Deffontaines > > -- > With best regards

