Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Tom’s Hardware
Tom’s Hardware
Technology
Aaron Klotz

AMD Zen 1 Vulnerability Emerges, Dividing by 0 Can Leak Sensitive Data

A Ryzen processor sitting in a motherboard socket.

Despite the fact that AMD's Zen 1 architecture is immune to the recent 'Inception' vulnerability affecting modern Zen 3 and Zen 4 CPUs, another vulnerability has been found that affects Zen 1 CPUs specifically. According to a report by Phoronix, a new Zen 1 vulnerability was found that can release potentially sensitive data if the CPU divides an integer calculation by the number 0 in Linux operating systems.

According to commentary made by AMD Linux developer Borislav Petkov, the bug specifically leaves "stale quotient data" after a Zen 1 CPU divides an integer calculation by 0 in certain circumstances. The fix involves doing a "dummy division 0/1 before returning from the #DE exception handler in order to avoid any leaks of potentially sensitive data."

Thankfully the Linux community has already issued a bug fix, resolving the issue. Petkov authorized a Linux kernel patch to work around the vulnerability. The patch was merged into Linux 6.5 kernel today and is set to be back-ported to all stable Linux kernel releases as well. So if you are running an OS featuring an older Linux kernel, you don't have to upgrade to the latest Linux kernel version to get the new fix.

Interestingly there is also another workaround method that doesn't involve kernel updates. Apparently, the vulnerability can be neutralized by disabling Symmetric Multi-Threading on Zen 1 CPUs as well. This method obviously has its flaws, since it reduces the performance benefits SMT offers on AMD CPUs, and in many cases, it also disables sleep mode due to an architectural limitation. But it is a good way to temporarily patch the vulnerability for Linux users that are waiting for the kernel patch to be released for their specific OS.

This issue is reminiscent of a similar problem on Intel's Skylake chips from several years ago, where disabling Intel's HyperThreading technology patched some security holes on those chips.

Thankfully the issue appears to be Linux-specific and does not affect Windows operating systems. Plus the vulnerability is already being actively patched for Linux users. However, the same cannot be said of the two other vulnerabilities affecting modern AMD CPUs and Intel CPUs, Inception and Downfall, right now.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.