Jump to content

Intel KPTI flaw

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 184.176.111.201 (talk) at 23:12, 3 January 2018. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The Intel kernel page-table isolation flaw (Intel KPTI flaw) is a CPU bug found in a large complement of Intel CPUs and first reported on 3 January 2018 by The Register. The bug consists of a hardware security flaw that "can exploit security weaknesses and access security keys, passwords, and files cached from a disk".[1] Microsoft, Apple and Linux developers have moved to patch supported operating systems to workaround the flaw that cannot be fixed in microcode. The Linux fix is kernel page-table isolation (KPTI). In some cases, the fixes would make the computers equipped with those CPUs 30% slower.

AMD CPUs are not affected, according to Tom Lendacky.[2][3][4]

See also

References

  1. ^ "Intel's processors have a security bug and the fix could slow down PCs". The Verge. Retrieved 2018-01-03.
  2. ^ "LKML: Tom Lendacky: [PATCH] x86/cpu, x86/pti: Do not enable PTI on AMD processors". lkml.org. Retrieved 2018-01-03.
  3. ^ "The mysterious case of the Linux Page Table Isolation patches". python sweetness. Retrieved 2018-01-03.
  4. ^ "Linux Gaming Performance Doesn't Appear Affected By The x86 PTI Work - Phoronix". www.phoronix.com. Retrieved 2018-01-03.