Intel Processors Double Exposure Vulnerabilities: Second-Generation Core Duo All Affected

The specter of the beginning of the year, which caused two major security breaches, caused a great uproar. The Intel processor has been particularly hard hit, and afterwards more variants have been discovered. Until now, all parties have continued to repair.

Now, security researchers have found a serious security hole in the Intel processor, affecting all Core Core Xeon Xeon processors since the second-generation Core Sandy Bridge in 2011, and one can't run.

It is reported that this loophole utilizes a name 'lazy FP state restore'The features, which include a series of instructions, can temporarily save or restore the FPU floating-point unit status for applications that are not very frequently used. This is intended to optimize performance, and is somewhat cache-accelerated.

Using this vulnerability, hackers can sniff users' sensitive information from the processor, such as the encryption key that protects the data.

Intel officials have confirmed this vulnerability and are working with security personnel, hardware and software vendors who have discovered the vulnerability, but it is unclear when the patch will be released.

Red Hat Red Hat also issued a security warning confirming that the Red Hat Enterprise Linux 7 system will disable lazy FP state restore by default, which is not affected. AMD processors are also unaffected.

UPATE -

Intel officially responded that this vulnerability is similar to the previous ghost variant 3a. In fact, many years ago, the operating system of various data centers and client platforms had been fixed by the virtual machine manager. Currently, industry partners are working on software. Update, fix remaining affected environment and expect these updates to be available in the coming weeks.

2016 GoodChinaBrand | ICP: 12011751 | China Exports