New vulnerability affects Intel X86 processors

by | Jun 15, 2018

ETIQUETAS: Hot news | Security

After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the Intel processors with X86 architecture from Sandy Bridge.

This security flaw takes advantage of a system performance optimization function that allows extracting sensitive information from the system. Through a series of commands it is possible to extract data from the FPUs and then use it to obtain specific data of the different applications that the user has in his device.

This is a very serious problem given the high number of affected users, all those who have devices with Intel Core and Intel Xeon processors. Being an error in the CPU itself, affects all operating systems that use deferred FPU context switching.

This function is used to optimize performance by saving and restoring the records of the FPU (floating point unit). The failure allows another process to access these records and to extract all the data stored there.

This vulnerability can be addressed with operating system updates. Many Linux and Microsoft distros already have released updates related to this security flaw.

Source: Tecnonucleous

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

On-premises vs. cloud: Which is better for your business?

The choice of technology infrastructure is crucial for the growth and competitiveness of businesses. This article analyzes the advantages and disadvantages of “on-premises” and “cloud computing” models, focusing on aspects such as costs, scalability, security, and management.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content