After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the Intel processors with X86 architecture from Sandy Bridge.
This security flaw takes advantage of a system performance optimization function that allows extracting sensitive information from the system. Through a series of commands it is possible to extract data from the FPUs and then use it to obtain specific data of the different applications that the user has in his device.
This is a very serious problem given the high number of affected users, all those who have devices with Intel Core and Intel Xeon processors. Being an error in the CPU itself, affects all operating systems that use deferred FPU context switching.
This function is used to optimize performance by saving and restoring the records of the FPU (floating point unit). The failure allows another process to access these records and to extract all the data stored there.
This vulnerability can be addressed with operating system updates. Many Linux and Microsoft distros already have released updates related to this security flaw.