Thursday, January 04
There is apparently a security flaw in every recent Intel microprocessor, and by "recent" I mean "since November 1995".
Ryzen CPUs (and maybe AMD processors in general) appear to not be affected.
This one looks nasty--it looks like speculatively-executed instructions don't get security checks. Someone on Twitter claims to have an exploit that lets them read kernel memory.
Posted by: Rick C at Thursday, January 04 2018 11:21 AM (h8yX6)
Posted by: Pixy Misa at Thursday, January 04 2018 11:30 AM (PiXy!)
Posted by: David Boxenhorn at Thursday, January 04 2018 08:17 PM (h8yX6)
Posted by: Rick C at Friday, January 05 2018 05:34 AM (h8yX6)
Posted by: Pixy Misa at Friday, January 05 2018 08:40 AM (PiXy!)
Posted by: Wonderduck at Friday, January 12 2018 11:03 AM (h8yX6)
(a) Make heavy use of virtual machines
(b) Do heavy random I/O - databases are about the only thing that really does this.
Games are about 1% slower. Most desktop apps will be affected even less than that.
Cloud servers are badly affected. One multi-user game went offline when Amazon patch their servers because the load basically doubled for the same number of players.
I do know one developer who returned his brand new Intel 8700K system and replaced it with a cheaper AMD Ryzen 1700 machine (which is what I have) and got much better performance. (AMD isn't affected by Meltdown, and is partly safe from the other bug, Spectre.)
Posted by: Pixy Misa at Saturday, January 13 2018 08:35 PM (PiXy!)
Yeah, since that's my day job, I'm looking forward to that.
Posted by: Rick C at Sunday, January 14 2018 04:07 AM (h8yX6)
Posted by: Mauser at Monday, January 15 2018 01:52 PM (h8yX6)
Will get both fixed ASAP.
Posted by: Pixy Misa at Tuesday, January 16 2018 05:40 PM (PiXy!)
53 queries taking 0.1022 seconds, 261 records returned.
Powered by Minx 1.1.6c-pink.