Another Vulnerability In Intel CPUs – Dubbed Lazy FP State Restore

IT | Jun 16, 2018 | Master3395

Hardware vulnerabilities seem to be much more prominent of late. Recently, another hardware vulnerability was found in Intel CPUs that would allow hackers to steal data from systems containing the affected chips. The newly discovered vulnerability is a side-channel speculative execution vulnerability, the vulnerability has been termed as Lazy FP State Restore vulnerability.

Lazy FP State Restore Vulnerability Detected in Intel CPUs
As disclosed by Intel in a release on Wednesday, a group of researchers found another vulnerability in Intel chips. Similar to Meltdown and Spectre, this vulnerability also exploits speculative execution of the processor, allowing access to sensitive and encrypted data.

The researchers include Thomas Prescher (Cyberus Technology GmbH), Julian Stecklina (Amazon Germany), Zdenek Sojka (SYSGO AG) who reported this problem in detail. According to what they found, this vulnerability exists in the Floating Point Unit (FPU) of the processors that work to restore systems current state and switch between processes.

Most modern CPUs use Lazy FP State Restore technique to hold the current state of applications for restoring some time later as needed (hence named as ‘lazy’ state restore). The bug here deals with the way floating points are calculated and leaks information during switching of processes. Hence, a hacker could access information about the activity of other applications along with encryption operations.

As stated in Intel’s official statement,

Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value.

The Vulnerability Affects All Intel Core-based Microprocessors
Assigned as CVE-2018-3665, the newly discovered vulnerability is similar to Meltdown Variant 3a.

For now, Intel recommends using Eager FPU over Lazy Restore.

For relevant states (e.g. x87, SSE, AVX, etc.), Intel recommends system software developers utilize Eager FP state restore in lieu of Lazy FP state restore.

The Lazy FP State Restore vulnerability affects all Intel Core-based microprocessors. Microsoft confirms that Lazy Restore is active in all Windows versions by default. There is no way to disable this feature. However, it does not affect systems with ARM and AMD processors. So, Azure users will remain secure from this bug. Likewise, for Linux, those versions using Eager FPU also remain unaffected.

Keywords: Intel, intel CPU vulnerability, intel hack, Lazy FP State Restore, LazyFP

Sources: latesthackingnews.com

Author: Master3395


comments powered by Disqus

Page 1 of 366  >  >>

Epic Games feel threatened - tempt with free Battle Pass


Feb 19, 2019 | Category: General | Comments

"Apex Legends" has become the first choice of streams.

read more…

Say this five times to your iPhone, so take the night


Feb 18, 2019 | Category: Apple | Comments

The error is in the latest software.

read more…

Now you can run Windows 10 on this one


Feb 17, 2019 | Category: IT | Comments

Pull out your Raspberry Pi.

read more…

Page 1 of 366  >  >>