OT: Evidence of A Intel Virtual Memory Vulnerability
Brad Roberts
braddr at puremagic.com
Thu Jan 4 02:06:04 UTC 2018
On 1/3/2018 7:51 AM, Jack Stouffer via Digitalmars-d wrote:
> The gist of the story is that an Intel vulnerability is requiring OS
> vendors to institute Page Table Isolation in their kernels. This fix has
> an _across the board_ 5-7% slowdown on Intel chips.
>
> Worse yet, programs which do lots of syscalls will see around a 30%
> slowdown or more, including compilation.
>
> AMD is not effected.
>
> Details and discussion:
> Reddit:
> https://www.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/
> HN: https://news.ycombinator.com/item?id=16046636
Calling it a vendor or architecture specific issue is a bit misleading,
based on the reading I did today. There's a couple different
vulnerabilities here and they tie back to speculative (ie out of order)
execution, timing of branch prediction, and timing of various
conditions. These techniques are _widely_ used among high speed
processors and any that use them are likely to be vulnerable when an
adversary can control and time execution of code and data in caches.
The same basic techniques have shown up in a number of recent exploits,
for example some of those in SSL and TLS over the last few years.
It's very interesting research and I fully expect more of this sort of
issue as more and more research is done.
More information about the Digitalmars-d
mailing list