※ 引述《ckenken (混沌之子)》之铭言:
: Google:CPU漏洞影响不只英特尔,还有AMD与ARM
: 5.备注:
: 搞了半天是 Google 的资安 team 先发现的 XDD
: 说好的 AMD 风险接近零??
: 现在该信哪一边呢?
: 还是说大家都降 20%,可以和平共处~
转贴电虾最新消息,Linux之父Linus Torvalds在公开论坛上认证AMD没有这个CPU漏洞,
所以Linux的更新补丁不会影响到AMD的用户,以下是新闻内容:
https://goo.gl/MK9ei5
Linus Torvalds Trusts Lisa Su's Commitment to AMD CPU Security
Linus Torvalds on Github has posted a few urgent fixes for PTI to address
Intel's gaping security hole that we covered earlier today. Of note in his
post is that he is confident in excluding AMD processors from the update as
the company has been confident that they are not affected by the bug. Here is
what Lisa Su said (auto-start video warning). Also, the official statement
from AMD...
Exclude AMD from the PTI enforcement. Not necessarily a fix, but if AMD is so
confident that they are not affected, then we should not burden users with
the overhead - x86/cpu, x86/pti: Do not enable PTI on AMD processors
UPDATE: Tom Lendacky has made a BIG call!
AMD processors are not subject to the types of attacks that the kernel page
table isolation feature protects against. The AMD microarchitecture does not
allow memory references, including speculative references, that access higher
privileged data when running in a lesser privileged mode when that access
would result in a page fault.
Intel又被打脸了吗?QQ