※ 引述《ckenken (混沌之子)》之銘言:
: Google:CPU漏洞影響不只英特爾,還有AMD與ARM
: 5.備註:
: 搞了半天是 Google 的資安 team 先發現的 XDD
: 說好的 AMD 風險接近零??
: 現在該信哪一邊呢?
: 還是說大家都降 20%,可以和平共處~
轉貼電蝦最新消息,Linux之父Linus Torvalds在公開論壇上認證AMD沒有這個CPU漏洞,
所以Linux的更新補丁不會影響到AMD的用戶,以下是新聞內容:
https://goo.gl/MK9ei5
Linus Torvalds Trusts Lisa Su's Commitment to AMD CPU Security
Linus Torvalds on Github has posted a few urgent fixes for PTI to address
Intel's gaping security hole that we covered earlier today. Of note in his
post is that he is confident in excluding AMD processors from the update as
the company has been confident that they are not affected by the bug. Here is
what Lisa Su said (auto-start video warning). Also, the official statement
from AMD...
Exclude AMD from the PTI enforcement. Not necessarily a fix, but if AMD is so
confident that they are not affected, then we should not burden users with
the overhead - x86/cpu, x86/pti: Do not enable PTI on AMD processors
UPDATE: Tom Lendacky has made a BIG call!
AMD processors are not subject to the types of attacks that the kernel page
table isolation feature protects against. The AMD microarchitecture does not
allow memory references, including speculative references, that access higher
privileged data when running in a lesser privileged mode when that access
would result in a page fault.
Intel又被打臉了嗎?QQ