Alessandro Selli <alessandrose...@linux.com> wrote:

>  I read that, as this is a CPU hardware bug, it affects all OSes:
> 
> https://www.bleepingcomputer.com/news/security/new-lazy-fp-state-restore-vulnerability-affects-all-intel-core-cpus/
> 
>       According to Intel this new vulnerability affects all Intel Intel
>       Core-based microprocessors and is a bug in the actual CPU, so it does
>       not matter what operating system the user is running. It could be
>       Windows, Linux, BSD, or any other operating running an an Intel
>       Core-based CPU and using "Lazy FPU context switching".

Yes, it affects any OS - but only (AIUI) if the do this “lazy FPU context 
switch”. From the report I read (on TheRegister 
https://www.theregister.co.uk/2018/06/13/intel_lazy_fpu_state_security_flaw/ ) 
recent Linux kernels don’t use that and so aren’t vulnerable.

> Modern versions of Linux – from kernel version 4.9, released in 2016, and 
> later ... are not affected by this flaw ... The Linux kernel team is 
> back-porting mitigations to pre-4.9 kernels


It then goes on to say that
> The fix is to employ a mechanism called eager FPU state restore, which modern 
> Linux, Windows and other kernels use. These mitigations do not carry a 
> performance hit – in fact, eager state switching can increase performance.


So it sounds like this one isn’t the big issue it initially looks like.

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to