[Beowulf] Intel CPU design bug & security flaw - kernel fix imposes performance penalty

Christopher Samuel chris at csamuel.org
Wed Jan 3 06:59:49 PST 2018

On 03/01/18 19:46, John Hearns via Beowulf wrote:

> I guess the phrase "to some extent" is the vital one here. Are there 
> any security exploits which use this information?

It's more the fact that it reduces/negates the protection that existing
kernel address space randomisation gives you, the idea of that being to
make it harder for a wide range of exploits, known and unknown.  More
info here:


All the best,
  Chris Samuel  :  http://www.csamuel.org/  :  Melbourne, VIC

More information about the Beowulf mailing list