Ormandy noted at least some microcode updates from AMD are making their way into the Linux kernel. Shared systems are the priority, it would seem, which makes sense given the nature of the design blunder. As for the rest of its affected silicon: AMD is targeting December 2023 for updates for desktop systems (eg, Ryzen 3000 and Ryzen 4000 with Radeon) October for high-end desktops (eg, Threadripper 3000) November and December for workstations (eg, Threadripper Pro 3000) and November to December for mobile (laptop-grade) Ryzens. The chip giant scored the flaw as a medium severity one, describing it as a "cross-process information leak."Ī microcode patch for Epyc 7002 processors is available now. The bug affects all AMD Zen 2 processors including the following series: Ryzen 3000 Ryzen Pro 3000 Ryzen Threadripper 3000 Ryzen 4000 Pro Ryzen 4000, 5000, and 7020 with Radeon Graphics and Epyc Rome datacenter processors.ĪMD today issued a security advisory here, using the identifiers AMD-SB-7008 and CVE-2023-20593 to track the vulnerability. While the exploit runs, it shows off the sensitive data being processed by the box, which can appear in fragments or in whole depending on the code running at the time. It should also work in virtualized guests that run on the bare metal. Proof-of-concept exploit code, produced by Ormandy, is available here, and we've confirmed it works on a Zen 2 Epyc server system when running on bare metal. It's understood a malicious webpage, running some carefully crafted JavaScript, could quietly exploit Zenbleed on a personal computer to snoop on this information. Malware already running on a system, or a rogue logged-in user, can exploit Zenbleed without any special privileges and inspect data as it is being processed by applications and the operating system, which can include sensitive secrets, such as passwords. Exploiting Zenbleed involves abusing speculative execution, though unlike the related Spectre family of design flaws, the bug is pretty easy to exploit. That's practical enough for someone on a shared server, such as a cloud-hosted box, to spy on other tenants. Zenbleed affects Ryzen and Epyc Zen 2 chips, and can be abused to swipe information at a rate of at least 30Kb per core per second. AMD has started issuing some patches for its processors affected by a serious silicon-level bug dubbed Zenbleed that can be exploited by rogue users and malware to steal passwords, cryptographic keys, and other secrets from software running on a vulnerable system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |