Announcement

Collapse
No announcement yet.

Intel's Linux Graphics Driver Gets Patched For A Gen9 Graphics Vulnerability

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Intel's Linux Graphics Driver Gets Patched For A Gen9 Graphics Vulnerability

    Phoronix: Intel's Linux Graphics Driver Gets Patched For A Gen9 Graphics Vulnerability

    On top of the Intel graphics driver patches back from November for denial of service and privilege escalation bugs, the Linux kernel received a new patch today for "CVE-2019-14615" regarding a possible data disclosure with Gen9 graphics hardware...

    http://www.phoronix.com/scan.php?pag...CVE-2019-14615

  • #2
    The processor isn't just sad, it's crying already :<

    Comment


    • #3
      Oh, Intel!

      Comment


      • #4
        Last of the Gen9 gpu line is Comet Lake(and Whiskey Lake prior to it, which came after Coffee Lake afaik). Whatever happened to Gen10 graphics though? Just like Windows skipping a 9th version..

        Comment


        • #5
          Originally posted by polarathene View Post
          Last of the Gen9 gpu line is Comet Lake(and Whiskey Lake prior to it, which came after Coffee Lake afaik). Whatever happened to Gen10 graphics though? Just like Windows skipping a 9th version..
          10 was Cannonlake.
          Michael Larabel
          http://www.michaellarabel.com/

          Comment


          • #6
            forcibly clearing the EU state on each context switch sounds expensive - I assume there will be a short article benchmarking it Michael ?

            Comment


            • #7
              Originally posted by boxie View Post
              forcibly clearing the EU state on each context switch sounds expensive
              If it is, hopefully there's a way to disable it. Local access exploits don't bother me as much for personal machines, especially if there is notable perf regression from their fixes.

              Originally posted by Michael View Post

              10 was Cannonlake.
              Ah, that was short lived. Thanks

              Comment


              • #8
                Originally posted by polarathene View Post
                If it is, hopefully there's a way to disable it. Local access exploits don't bother me as much for personal machines, especially if there is notable perf regression from their fixes.
                well if it can be exploited via a web browser you might just need to have it enabled all the time.

                come to think of it, it probably has a hit on energy usage as well.

                Comment


                • #9
                  Gen9 benchmarks underway...
                  Michael Larabel
                  http://www.michaellarabel.com/

                  Comment


                  • #10
                    Ivybridge + Haswell also affected - https://www.phoronix.com/scan.php?pa...-Graphics-Flaw
                    Michael Larabel
                    http://www.michaellarabel.com/

                    Comment

                    Working...
                    X