AMD Zen 1 Vulnerability Emerges, Dividing by 0 Can Leak Sensitive Data

A Ryzen processor sitting in a motherboard socket.
(Image credit: Shutterstock)

Despite the fact that AMD's Zen 1 architecture is immune to the recent 'Inception' vulnerability affecting modern Zen 3 and Zen 4 CPUs, another vulnerability has been found that affects Zen 1 CPUs specifically. According to a report by Phoronix, a new Zen 1 vulnerability was found that can release potentially sensitive data if the CPU divides an integer calculation by the number 0 in Linux operating systems.

According to commentary made by AMD Linux developer Borislav Petkov, the bug specifically leaves "stale quotient data" after a Zen 1 CPU divides an integer calculation by 0 in certain circumstances. The fix involves doing a "dummy division 0/1 before returning from the #DE exception handler in order to avoid any leaks of potentially sensitive data."

Thankfully the Linux community has already issued a bug fix, resolving the issue. Petkov authorized a Linux kernel patch to work around the vulnerability. The patch was merged into Linux 6.5 kernel today and is set to be back-ported to all stable Linux kernel releases as well. So if you are running an OS featuring an older Linux kernel, you don't have to upgrade to the latest Linux kernel version to get the new fix.

TOPICS
Aaron Klotz
Contributing Writer

Aaron Klotz is a contributing writer for Tom’s Hardware, covering news related to computer hardware such as CPUs, and graphics cards.