Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday October 30 2019, @06:14AM   Printer-friendly

https://www.zdnet.com/article/top-linux-developer-on-intel-chip-security-problems-theyre-not-going-away/

Greg Kroah-Hartman, the stable Linux kernel maintainer, could have prefaced his Open Source Summit Europe keynote speech, MDS, Fallout, Zombieland, and Linux, by paraphrasing Winston Churchill: I have nothing to offer but blood sweat and tears for dealing with Intel CPU's security problems.

Or as a Chinese developer told him recently about these problems: "This is a sad talk." The sadness is that the same Intel CPU speculative execution problems, which led to Meltdown and Spectre security issues, are alive and well and causing more trouble.

The problem with how Intel designed speculative execution is that, while anticipating the next action for the CPU to take does indeed speed things up, it also exposes data along the way. That's bad enough on your own server, but when it breaks down the barriers between virtual machines (VM)s in cloud computing environments, it's a security nightmare.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Wednesday October 30 2019, @07:41PM

    by Anonymous Coward on Wednesday October 30 2019, @07:41PM (#913840)

    "you don't mind if Mr. Dahmer joins us for the ride, do you?"
    Hopefully there aren't many around, but you might not care if you are of like mind.

    Don''t share with your enemies, but if another thread is already sharing the same address space, then sharing the CPU pair might be just fine.
    A multicore app should be able to take advantage of these cores.