top | item 41226956

(no title)

str3wer | 1 year ago

i have a C906 running linux, how can i mitigate this vulnerability?

discuss

order

camel-cdr|1 year ago

Most likely you have the mitigation already in place, that is disabeling the XTheadVector extension. The regular distributions don't enable it, since it's a non standard incompatible vendor extension based on a draft spec.

When I wanted to benchmark their implementation last year I patched a kernel to enable it, and needed to consult the open source part of the core [0] to figure out that they placed the enable CSR bit in a different location than the final ratified spec. [1]

[0] https://github.com/T-head-Semi/openc906 (doesn't include XTheadVector extension)

[1] https://github.com/camel-cdr/rvv-d1

taneliv|1 year ago

From the article:

> No, software updates or patches cannot fix this vulnerability because it is a hardware bug. The only mitigation is to disable the vector extension in the CPU, which unfortunately impacts the CPU’s performance.

camel-cdr|1 year ago

This almost won't impact CPU performance at all, because basically no software/packages use the XTheadVector custom extension.

NovemberWhiskey|1 year ago

Do you let people run arbitrary code on your linux box? If not, you don't have anything to worry about, as far as I can see.