JOIN OUR
COMMUNITY

TRY OUR SOFTWARE

Open Virtualization Blog


New vulnerability affects Intel X86 processors

Posted by UDS Enterprise Team |

After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the Intel processors with X86 architecture from Sandy Bridge.

None

This security flaw takes advantage of a system performance optimization function that allows extracting sensitive information from the system. Through a series of commands it is possible to extract data from the FPUs and then use it to obtain specific data of the different applications that the user has in his device.

This is a very serious problem given the high number of affected users, all those who have devices with Intel Core and Intel Xeon processors. Being an error in the CPU itself, affects all operating systems that use deferred FPU context switching.

This function is used to optimize performance by saving and restoring the records of the FPU (floating point unit). The failure allows another process to access these records and to extract all the data stored there.

This vulnerability can be addressed with operating system updates. Many Linux and Microsoft distros already have released updates related to this security flaw.

Source: Tecnonucleous


SHARE


0 COMMENTS

You must authenticate to review this post