For intel GPUs, except GEN8 (Broadwell), this week's vulnerability is being covered at Phoronix. Ostensibly, information disclosure to a local unprivileged user and possible DoS. At this point it is unclear if this vulnerability can be accessed by malicious code running in a web browser, so perhaps only relevant to people hosting virtual systems.
The Broadwell systems were apparently fixed by a past update. List of affected integrated graphics processors at https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html It is unknown if generations before 3 (Ivy Bridge) are affected, I suspect intel has stopped caring about such old hardware. The patch for Gen 9 (Skylake) is in linux-5.4.12, but the patch for Ivy Bridge and Haswell has stalled pending analysis of the performance impact. See e.g. https://www.phoronix.com/scan.php?page=news_item&px=Intel-Gen7-Graphics-Flaw and test results (apparently appalling, but for my use cases they are probably irrelevant) at https://www.phoronix.com/scan.php?page=article&item=intel-gen7-hit&num=1 Main phoronix articles for Gen 9 fix is : https://www.phoronix.com/scan.php?page=news_item&px=Intel-CVE-2019-14615 There were some tests run there but I can't see a link (my impression is that the performance loss was slight). ĸen -- The politics of wizardry were either very simple, and resolved by someone ceasing to breathe, or as complex as one ball of yarn in a room with three bright-eyed little kittens. - Unseen Academicals -- http://lists.linuxfromscratch.org/listinfo/blfs-dev FAQ: http://www.linuxfromscratch.org/blfs/faq.html Unsubscribe: See the above information page
