[Beowulf] [upgrade strategy] Intel CPU design bug & security flaw - kernel fix imposes performance penalty

Tim Cutts tjrc at sanger.ac.uk
Sun Jan 7 12:17:41 PST 2018

It seems fairly clear to me that any processor which performs speculative execution will be vulnerable to timing attacks of this nature.

I was pointed to a very much simplified but very clear explanation of this in a blog post by Eben Upton (of Raspberry Pi fame):


Well worth reading, and relatively accessible for people who aren’t super-nerds, so a good one to send to friends and family who are interested.


On 05/01/2018, 19:14, "Beowulf on behalf of Christopher Samuel" <beowulf-bounces at beowulf.org on behalf of chris at csamuel.org> wrote:

    On 06/01/18 03:46, Jonathan Aquilina wrote:
    > Chris on a number of articles I read they are saying AMD's are not 
    > affected by this.
    That's only 1 of the 3 attacks to my understanding. The Spectre paper says:
    # Hardware. We have empirically verified the vulnerability of several
    # Intel processors to Spectre attacks,  including Ivy Bridge, Haswell
    # and Skylake based processors.    We  have  also  verified  the
    # attack’s  applicability to  AMD  Ryzen  CPUs.   Finally,  we  have
    # also  successfully mounted Spectre attacks on several Samsung and
    # Qualcomm processors (which use an ARM architecture) found in popular
    # mobile phones.
    All the best,
      Chris Samuel  :  http://www.csamuel.org/  :  Melbourne, VIC
    Beowulf mailing list, Beowulf at beowulf.org sponsored by Penguin Computing
    To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf

 The Wellcome Sanger Institute is operated by Genome Research 
 Limited, a charity registered in England with number 1021457 and a 
 company registered in England with number 2742969, whose registered 
 office is 215 Euston Road, London, NW1 2BE.

More information about the Beowulf mailing list