News: 0001627798

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched

([AMD] 3 Hours Ago AMD FPDSS)


Made public today was the Floating Point Divider State Sampling bug (stylized as FP-DSS or FPDSS) affecting original AMD Zen 1 (and Zen 1+) processors. The Linux kernel is already to go with a security fix for those still relying on the very first Ryzen or EPYC processors.

Security researchers discovered a transient execution vulnerability that could lead to a user-privileged attacker to leak sensitive data via the floating point divisor units. This just affects local user access to the system and AMD believes risk of data loss is low especially with FP operations in privilege code not being too common. This affects just Zen 1 / Zen 1+ processors and not newer versions of Zen processors from more recent years.

The AMD security bulletin with the details on this FP-DSS/FPDSS security vulnerability can be found via [1]AMD.com .

The Linux kernel has already landed a patch that contains the needed mitigation. In this case all that is needed at the OS level is setting bit 9 of MSR C001_1028 to 1. [2]This patch is the simple mitigation now in Linux Git for Linux 7.1 while it will be back-ported to stable Linux kernel versions in the days ahead.



[1] https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7053.html

[2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e55d98e7756135f32150b9b8f75d580d0d4b2dd3



"Well, well, well! Well if it isn't fat stinking billy goat Billy Boy in
poison! How art thou, thou globby bottle of cheap stinking chip oil? Come
and get one in the yarbles, if ya have any yarble, ya eunuch jelly thou!"
-- Alex in "Clockwork Orange"