'Critical flaw' discovered in Intel's Skylake and Kaby Lake CPUs

John Leonard
clock • 2 min read

Flaw in 6th and 7th gen CPUs could cause applications to behave unexpectedly, data loss or corruption

Intel's 6th and 7th generation Skylake and Kaby Lake processors have a ‘critical' flaw that could cause applications to behave unpredictably, with possible data loss or corruption.

The flaw was reported by developers at Linux distribution Debian, following earlier work by OCaml toolchain developers. The issue affects all operating systems and "could cause spurious errors, such as application and system misbehaviour, data corruption, and data loss," Debian developer Henrique de Moraes Holschuh writes.

The processors exhibiting the flaw are 6th and 7th generation Intel Core processors (desktop, embedded, mobile and HEDT), their related server processors (such as Xeon v5 and Xeon v6), as
well as some Intel Pentium processor models. Only models released from 2015 onwards are affected.

According to the Debian blog, Intel is aware of the flaw and has apparently supplied patches, but the firm neglected to inform the OCaml researchers who originally reported the bug about this.

The flaw is detailed by Intel errata documentation as follows:

Errata: SKZ7/SKW144/SKL150/SKX150/SKZ7/KBL095/KBW095
"Short Loops Which Use AH/BH/CH/DH Registers May Cause Unpredictable System Behavior."

Problem:  "Under complex micro-architectural conditions, short loops of less than 64 instructions that use AH, BH, CH or DH registers as well as their corresponding wider register (e.g. RAX, EAX or AX for AH) may cause unpredictable system behavior. This can only happen when both logical processors on the same physical processor are active."

Implication: "Due to this erratum, the system may experience unpredictable system behavior."

The exact conditions that could trigger the CPUs to act unpredictably are not clear, but the risk - apart from possible data corruption or loss or knock-on effects from an application behaving in an unexpected way - is that an attacker could use the flaw to craft an attack.

The defect only affects processors on which hyperthreading has been enabled, so a quick fix is to turn off this feature in the system BIOS, although this may require a BIOS/UEFI update.

For Debian 8 and 9 users, updated versions of the intel-microcode packages are available in the distro's repositories.

Computing has requested comment on this issue from Intel.

You may also like
Intel splits in two, signs deal with Microsoft

Chips and Components

'We want to be the foundry for the world'

clock 22 February 2024 • 7 min read
Intel unveils major AI leap in upcoming CPUs

Chips and Components

Panther Lake processors to debut in 2025

clock 30 January 2024 • 3 min read
Davos 2024 Day 3: Global leaders discuss adoption of AI and its potential risks

Compliance

UN chief warns against reckless pursuit of AI profits by tech giants

clock 18 January 2024 • 3 min read

More on Chips and Components

Pragmatic Semiconductor opens wafer fab in Durham

Pragmatic Semiconductor opens wafer fab in Durham

UK's first 300mm facility

Tom Allen
clock 28 March 2024 • 2 min read
Nvidia outlines AI strategies for GPUs and Kubernetes

Nvidia outlines AI strategies for GPUs and Kubernetes

At the KubeCon event in Paris this week, Nvidia engineers spoke of challenges and solutions for accelerating AI workloads using GPUs with Kubernetes.

John Leonard
clock 22 March 2024 • 3 min read
Nvidia unveils Blackwell GPU offering five times the performance for AI inference

Nvidia unveils Blackwell GPU offering five times the performance for AI inference

Blackwell GPU contains 208 billion transistors and is paired with 192GB of HBM3e memory

Graeme Burton
clock 20 March 2024 • 3 min read