AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched
([AMD] 3 Hours Ago
AMD FPDSS)
- Reference: 0001627798
- News link: https://www.phoronix.com/news/AMD-FP-DSS-Zen-1-Bug
- Source link:
Made public today was the Floating Point Divider State Sampling bug (stylized as FP-DSS or FPDSS) affecting original AMD Zen 1 (and Zen 1+) processors. The Linux kernel is already to go with a security fix for those still relying on the very first Ryzen or EPYC processors.
Security researchers discovered a transient execution vulnerability that could lead to a user-privileged attacker to leak sensitive data via the floating point divisor units. This just affects local user access to the system and AMD believes risk of data loss is low especially with FP operations in privilege code not being too common. This affects just Zen 1 / Zen 1+ processors and not newer versions of Zen processors from more recent years.
The AMD security bulletin with the details on this FP-DSS/FPDSS security vulnerability can be found via [1]AMD.com .
The Linux kernel has already landed a patch that contains the needed mitigation. In this case all that is needed at the OS level is setting bit 9 of MSR C001_1028 to 1. [2]This patch is the simple mitigation now in Linux Git for Linux 7.1 while it will be back-ported to stable Linux kernel versions in the days ahead.
[1] https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7053.html
[2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e55d98e7756135f32150b9b8f75d580d0d4b2dd3
Security researchers discovered a transient execution vulnerability that could lead to a user-privileged attacker to leak sensitive data via the floating point divisor units. This just affects local user access to the system and AMD believes risk of data loss is low especially with FP operations in privilege code not being too common. This affects just Zen 1 / Zen 1+ processors and not newer versions of Zen processors from more recent years.
The AMD security bulletin with the details on this FP-DSS/FPDSS security vulnerability can be found via [1]AMD.com .
The Linux kernel has already landed a patch that contains the needed mitigation. In this case all that is needed at the OS level is setting bit 9 of MSR C001_1028 to 1. [2]This patch is the simple mitigation now in Linux Git for Linux 7.1 while it will be back-ported to stable Linux kernel versions in the days ahead.
[1] https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7053.html
[2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e55d98e7756135f32150b9b8f75d580d0d4b2dd3