Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
|
SecurityTracker Alert ID: 1041125 |
SecurityTracker URL: http://securitytracker.com/id/1041125
|
CVE Reference:
CVE-2018-3665
(Links to External Site)
|
Date: Jun 14 2018
|
Impact:
Disclosure of system information
|
Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Intel Core-based processors. A local user can obtain potentially sensitive information.
A local user can conduct cache side-channel attacks to exploit a flaw in the 'Lazy Floating Point Unit (FPU)' scheme where the kernel saves and restores FPU state during task switching to potentially determine FPU state bits.
System software that utilize the Lazy FPU state restore method to delay the restoring of state until an instruction operating on that state is actually executed by the new process is affected.
Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival reported this vulnerability.
|
Impact:
A local user can obtain potentially sensitive FPU state information on the target system.
|
Solution:
The vendor recommends that using 'Eager FP state restore' in lieu of 'Lazy FP state restore'.
Additional recommendations are provided in the vendor advisory.
The vendor advisory is available at:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
|
Vendor URL: www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html (Links to External Site)
|
Cause:
Access control error, State error
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|