Sunday, August 19, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Amazon to Release Live TV Recorder
U.S. Wants to Wiretap Facebook Messenger, Report Says
More Affordable, 13-inch MacBook and $160 AirPower Expected at Apple's Event
Google to Launch Its Own Smart Display, Report Says
Nvidia Reports Record Revenue From Datacenter, Gaming, Professional Visualization, Automotive
Arm Client CPU Roadmap Includes Advanced Hercules and Deimos Chips
Google To Release Lightweight Version of Android Pie for Entry-level Smartphones
Japan Accuses Apple of Pressuring Game Rivals: Nikkei
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > 'Lazy S...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 14, 2018
'Lazy State' CPU Security Hole Unveiled by Intel


Intel announced that there's another CPU security bug in its Core-based microprocessors. The latest Intel revelation, Lazy FP state restore, can theoretically pull data from your programs, including encryption software, from your computer regardless of your operating system.

Like Meltdown and Spectre forebears, this is a speculative execution vulnerability. It affects Intel designs similar to variant 3-a of the previous stuff, but it's not Meltdown. Still, it allows the floating point registers to be leaked from another process, but alas that means the same registers as used for crypto, etc.

System software may utilize the Lazy FP state restore technique to delay the restoring of state until an instruction operating on that state is actually executed by the new process. Systems using Intel Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel.

If an XSAVE-enabled feature is disabled, then Intel recommends either its state component bitmap in the extended control register (XCR0) is set to 0 (e.g. XCR0[bit 2]=0 for AVX, XCR0[bits 7:5]=0 for AVX512) or the corresponding register states of the feature should be cleared prior to being disabled. Also for relevant states (e.g. x87, SSE, AVX, etc.), Intel recommends system software developers utilize Eager FP state restore in lieu of Lazy FP state restore.

Lazy State does not affect AMD processors.

Most versions of Windows, including Server 2016 and Windows 10. are believed to be safe. If you're still using Windows Server 2008, however, you will need a patch.

This security problem was found by Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology, and Zdenek Sojka from SYSGO AG.



Previous
Next
Apple to Patch iPhone Security Hole Used by Police        All News        Comcast Makes $65 billion to buy Fox Media Assets
PCIe 5.0 Coming Next Year With in 2019 With 32GT/s Data Rates, But Not Without a Cost     PC Parts News      Researchers Speed Intel's 3D XPoint Computer Memory

Get RSS feed Easy Print E-Mail this Message

Related News
Intel Introduces New NUC Kits and NUC Mini PCs
Intel Discloses New Chip Security Flaws
Fraunhofer Scientists Find Dangerous Security Holes in Tracker Apps
Intel Sets the Stage for the Persistent Memory Revolution and FPGA Acceleration
Intel Promotes Optane And QLC Solutions, World's Densest 'Ruler' SSD
Intel Outlines 'Data-Centric' Strategy, Shows off Xeon Roadmap
Intel Intros 660p Series M.2 NVMe SSDs with QLC NAND Flash
Broadcom to Design 7-nm AI processor For Wave: report
Intel Claims Progress on 10nm Yields But Pushes back Release Schedule
DARPA to Work With Nvidia, Qualcomm, IBM and Intel on Post-Moore's-law Projects
Micron and Intel to End Their 3D XPoint Joint Development Partnership
Microsoft Calls for Public Regulation of AI Face Recognition Software

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .