Intel re-bundles it with another vulnerability that also affects virtual memory management

Microprocessor chip upside down

A mysterious security error it affects all contemporary Intel CPU architectures that have the ability to implement virtual memory. A total redesign of these hardware architectures will probably be needed to solve the problem completely, but patches have already been worked to amend it from the software and the patches are already landing in the Linux kernel. In the case of Microsoft's systems based on Windows NT, they began to be solved in November of last year. Another case similar to the one we had with the known vulnerability that affected RAM memories and that was known as Rowhammer, compromising security.

Well, now this new problem could be affecting virtualization environments as common and used as the services of Amazon Web Services (AWS) EC2 and also those of Google Compute Engine among others. The truth is that the problem is not too serious, but the scope is wide due to the large number of architectures it affects, in addition to solving the problem using software is complicated. Specifically, the problem derived from this Intel error lies in the LWN, the kernel page isolation tables and that intervene in the memory management by the kernel. Then we find a complicated solution if it is done by software and that would not imply the best of the solutions and on the other hand we have to go to the root of the problem and redesign the hardware, specifically the affected architectures that allow managing this type of memory. That is not cheap or fast either, since we will have to wait for new generations of hardware that we would obviously have to acquire.

But going back to the software solution, that is, by patching, it is not good either as it would seriously affect the performance. Our CPU could have a considerable performance loss, up to 50%. Why? Well, to solve it, a code would have to be generated so that it empty the TLB memory (Translation Lookaside Buffer), a cache that speeds up performance considerably by locating faster where the data and instructions are located in the virtual memory of the system. But having to delete them every time the kernel starts and every time the user code resumes its execution, because the problem is notable ...

The content of the article adheres to our principles of editorial ethics. To report an error click here!.

5 comments, leave yours

Leave a Comment

Your email address will not be published.



  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   pepo said

    The crappy popover of "follow us on Facebook" that appears on each visit (at least, if the cookies are cleared), is disgusting ...

    1.    Pepito said

      Well, go the other way and do not hunch.

    2.    manuel said

      I totally agree, it could be on one side of the page and not on the whole card forcing you to close. It is in very bad taste.

  2.   RED17 said

    The good thing that I'm already moving to AMD Ryzen.

  3.   poor talkative said

    The news is wrong. It is not a Linux problem, but a design problem for Intel CPUs. It's very serious. So much so that the only solution is to modify the operating systems to bridge it (linux, windows, ios, etc).