<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New Spectre-v2 vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 08:36:31 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1760216</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 18:01:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1760216</guid>
		<description><![CDATA[Stupid Spectre exploit.

Linux Kernel 5.17 Delayed by a Week to Tackle Spectre v2 Exploit
https://news.itsfoss.com/linux-kernel-5-17-spectre-delay/

With last-minute Spectre fixes, Linux Kernel 5.17 release was delayed while restarting the automated testing process.

Linux Kernel 5.17 was scheduled to release the previous day (Sunday).

Unfortunately, (or for better), Spectre V2, another variant of the Spectre vulnerability affecting the processors, was discovered.

But, what is the Spectre v2 vulnerability affecting the chips? Is it essential for the Linux Kernel 5.17 to include a fix?

Linux Kernel 5.17 Delayed
While the fixes for Spectre attacks made their way to the Linux Kernel 5.17, the automation testing in place needs time.

With the announcement of Linux Kernel 5.17 release candidate 8, Linus Torvalds mentions that the patches were “mostly fine” with some more fixes added. However, it is best to go through all the automated tests to make sure everything’s fine with the release]]></description>
		<content:encoded><![CDATA[<p>Stupid Spectre exploit.</p>
<p>Linux Kernel 5.17 Delayed by a Week to Tackle Spectre v2 Exploit<br />
<a href="https://news.itsfoss.com/linux-kernel-5-17-spectre-delay/" rel="nofollow">https://news.itsfoss.com/linux-kernel-5-17-spectre-delay/</a></p>
<p>With last-minute Spectre fixes, Linux Kernel 5.17 release was delayed while restarting the automated testing process.</p>
<p>Linux Kernel 5.17 was scheduled to release the previous day (Sunday).</p>
<p>Unfortunately, (or for better), Spectre V2, another variant of the Spectre vulnerability affecting the processors, was discovered.</p>
<p>But, what is the Spectre v2 vulnerability affecting the chips? Is it essential for the Linux Kernel 5.17 to include a fix?</p>
<p>Linux Kernel 5.17 Delayed<br />
While the fixes for Spectre attacks made their way to the Linux Kernel 5.17, the automation testing in place needs time.</p>
<p>With the announcement of Linux Kernel 5.17 release candidate 8, Linus Torvalds mentions that the patches were “mostly fine” with some more fixes added. However, it is best to go through all the automated tests to make sure everything’s fine with the release</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1760172</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 13:23:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1760172</guid>
		<description><![CDATA[Intel CPUs Suffer Performance Hit From New Spectre-v2 Mitigations
https://www.tomshardware.com/news/intel-cpus-performance-hit-spectre-v2-migitations]]></description>
		<content:encoded><![CDATA[<p>Intel CPUs Suffer Performance Hit From New Spectre-v2 Mitigations<br />
<a href="https://www.tomshardware.com/news/intel-cpus-performance-hit-spectre-v2-migitations" rel="nofollow">https://www.tomshardware.com/news/intel-cpus-performance-hit-spectre-v2-migitations</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1760171</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 13:23:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1760171</guid>
		<description><![CDATA[The Performance Impact Of AMD Changing Their Retpoline Method For Spectre V2
https://www.phoronix.com/scan.php?page=article&amp;item=amd-retpoline-2022&amp;num=1]]></description>
		<content:encoded><![CDATA[<p>The Performance Impact Of AMD Changing Their Retpoline Method For Spectre V2<br />
<a href="https://www.phoronix.com/scan.php?page=article&#038;item=amd-retpoline-2022&#038;num=1" rel="nofollow">https://www.phoronix.com/scan.php?page=article&#038;item=amd-retpoline-2022&#038;num=1</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1760170</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Mar 2022 13:22:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1760170</guid>
		<description><![CDATA[AMD Strategy For Spectre V2 Vulnerability Noted As “Inadequate”, Up To 54% Drop In CPU Performance
https://wccftech.com/amd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance/#aoh=16473521807041&amp;referrer=https%3A%2F%2Fwww.google.com&amp;amp_tf=Julkaisija%3A%20%251%24s&amp;ampshare=https%3A%2F%2Fwccftech.com%2Famd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance%2F

Intel and Arm processors were hit this last week by the Spectre V2 vulnerability, the Branch History Injection, or BHI. The Spectre exploit originated several years ago, but this new line of mitigation has had a significant effect on the two chip manufacturers. AMD has a much different design to their chips, allowing them to avoid harm this week. However, three security researchers from Intel have recently written a white paper outlining AMD&#039;s chipset having code exposures. In review, AMD has now issued a new security bulletin to reflect the new efficiency for keeping their product safe.

AMD is moving forward with a &quot;generic&quot; Retpoline approach to fix insufficient procedures to ward off BHI vulnerability
The initial Spectre and Meltdown flaws discovered in December 2017 outline issues with Intel&#039;s chip designs, which were found by four separate research teams and reported to the leading company around the same time frame.]]></description>
		<content:encoded><![CDATA[<p>AMD Strategy For Spectre V2 Vulnerability Noted As “Inadequate”, Up To 54% Drop In CPU Performance<br />
<a href="https://wccftech.com/amd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance/#aoh=16473521807041&#038;referrer=https%3A%2F%2Fwww.google.com&#038;amp_tf=Julkaisija%3A%20%251%24s&#038;ampshare=https%3A%2F%2Fwccftech.com%2Famd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance%2F" rel="nofollow">https://wccftech.com/amd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance/#aoh=16473521807041&#038;referrer=https%3A%2F%2Fwww.google.com&#038;amp_tf=Julkaisija%3A%20%251%24s&#038;ampshare=https%3A%2F%2Fwccftech.com%2Famd-strategy-spectre-v2-vulnerability-inadequate-54-percent-drop-in-cpu-performance%2F</a></p>
<p>Intel and Arm processors were hit this last week by the Spectre V2 vulnerability, the Branch History Injection, or BHI. The Spectre exploit originated several years ago, but this new line of mitigation has had a significant effect on the two chip manufacturers. AMD has a much different design to their chips, allowing them to avoid harm this week. However, three security researchers from Intel have recently written a white paper outlining AMD&#8217;s chipset having code exposures. In review, AMD has now issued a new security bulletin to reflect the new efficiency for keeping their product safe.</p>
<p>AMD is moving forward with a &#8220;generic&#8221; Retpoline approach to fix insufficient procedures to ward off BHI vulnerability<br />
The initial Spectre and Meltdown flaws discovered in December 2017 outline issues with Intel&#8217;s chip designs, which were found by four separate research teams and reported to the leading company around the same time frame.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759866</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 13:34:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759866</guid>
		<description><![CDATA[https://www.tomshardware.com/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability" rel="nofollow">https://www.tomshardware.com/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759865</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 13:33:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759865</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/intel-amd-arm-warn-of-new-speculative-execution-cpu-bugs/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/intel-amd-arm-warn-of-new-speculative-execution-cpu-bugs/" rel="nofollow">https://www.bleepingcomputer.com/news/security/intel-amd-arm-warn-of-new-speculative-execution-cpu-bugs/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759863</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 13:33:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759863</guid>
		<description><![CDATA[https://www.tomshardware.com/uk/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/uk/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability" rel="nofollow">https://www.tomshardware.com/uk/news/intel-alder-lake-arm-cpus-affected-by-new-spectre-vulnerability</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759862</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 13:32:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759862</guid>
		<description><![CDATA[https://global.techradar.com/en-za/news/spectre-returns-intel-and-arm-based-cpus-hit-by-serious-vulnerability]]></description>
		<content:encoded><![CDATA[<p><a href="https://global.techradar.com/en-za/news/spectre-returns-intel-and-arm-based-cpus-hit-by-serious-vulnerability" rel="nofollow">https://global.techradar.com/en-za/news/spectre-returns-intel-and-arm-based-cpus-hit-by-serious-vulnerability</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759859</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 13:29:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759859</guid>
		<description><![CDATA[https://www.tomshardware.com/news/intel-amd-spectre-v2-vulnerability-mitigation-bug-fix-patch-cpu-security]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/news/intel-amd-spectre-v2-vulnerability-mitigation-bug-fix-patch-cpu-security" rel="nofollow">https://www.tomshardware.com/news/intel-amd-spectre-v2-vulnerability-mitigation-bug-fix-patch-cpu-security</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/03/14/new-spectre-v2-vulnerability/comment-page-1/#comment-1759844</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 11:30:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191028#comment-1759844</guid>
		<description><![CDATA[https://www.tomshardware.com/news/amd-cpus-see-less-than-10-performance-drop-from-revised-spectre-v2-mitigations]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/news/amd-cpus-see-less-than-10-performance-drop-from-revised-spectre-v2-mitigations" rel="nofollow">https://www.tomshardware.com/news/amd-cpus-see-less-than-10-performance-drop-from-revised-spectre-v2-mitigations</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
