Zenbleed: an AMD Zen 2 speculative vulnerability
all Zen 2 class processors" from AMD. (Wayback Machine link as the original site is overloaded.) It can allow local attackers to recover data used in string operations; "
If you remove the first word from the string 'hello world', what should the result be? This is the story of how we discovered that the answer could be your root password!" The report has lots of details, including an exploit; AMD has released a microcode update to address the problem.
We now know that basic operations like strlen, memcpy and strcmp will use the vector registers - so we can effectively spy on those operations happening anywhere on the system! It doesn't matter if they're happening in other virtual machines, sandboxes, containers, processes, whatever!This works because the register file is shared by everything on the same physical core. In fact, two hyperthreads even share the same physical register file.
Posted Jul 24, 2023 19:15 UTC (Mon)
by flussence (guest, #85566)
[Link] (12 responses)
and I just rebooted into 6.4.5 too… well what's one more. (sigh)
Posted Jul 25, 2023 3:57 UTC (Tue)
by flussence (guest, #85566)
[Link] (11 responses)
Posted Jul 25, 2023 11:39 UTC (Tue)
by ernstp (guest, #13694)
[Link] (10 responses)
Posted Jul 25, 2023 11:58 UTC (Tue)
by hawk (subscriber, #3195)
[Link] (9 responses)
Posted Jul 25, 2023 12:25 UTC (Tue)
by paulj (subscriber, #341)
[Link] (8 responses)
Posted Jul 25, 2023 20:38 UTC (Tue)
by flussence (guest, #85566)
[Link] (7 responses)
Which… sounds entirely on brand for the company that didn't have a real cpufreq driver for three years. Not impressed with AMD right now.
Posted Jul 25, 2023 22:28 UTC (Tue)
by paulj (subscriber, #341)
[Link] (6 responses)
Though, AM4? Isn't that Zen - while this vulnerability affects Zen2?
Maybe... the issue doesn't affect the CPUs they didn't issue patches for?
Posted Jul 25, 2023 22:52 UTC (Tue)
by tao (subscriber, #17563)
[Link]
Posted Jul 25, 2023 22:57 UTC (Tue)
by farnz (subscriber, #17727)
[Link] (2 responses)
Posted Jul 26, 2023 12:06 UTC (Wed)
by paulj (subscriber, #341)
[Link] (1 responses)
Posted Jul 26, 2023 13:39 UTC (Wed)
by MarcB (subscriber, #101804)
[Link]
The microcode applies to - and fixes - our EPYC servers, but it does not apply to the equally affected Ryzen PRO 3xxx we use on small servers.
Also the PoC works scaringly well. This vulnerability is on the level of Meltdown, i.e. much easier to exploit and providing a far higher leak rate rate than most Spectre attacks.
Posted Jul 26, 2023 8:40 UTC (Wed)
by flussence (guest, #85566)
[Link]
You're right - I'd forgotten just how glacial the hardware side of things moves sometimes (for the better :-)
Posted Jul 27, 2023 4:43 UTC (Thu)
by diegor (subscriber, #1967)
[Link]
AMD Ryzen 5000 Series Processors with Radeon Graphics
but POC on this processor doesn't work, and it is a zen3 cpu. It looks it is really a zen2 only issue.
Posted Jul 24, 2023 19:38 UTC (Mon)
by rfrancoise (subscriber, #15508)
[Link] (3 responses)
Posted Jul 24, 2023 21:10 UTC (Mon)
by intelfx (subscriber, #130118)
[Link] (2 responses)
Posted Jul 25, 2023 8:10 UTC (Tue)
by dvrabel (subscriber, #9500)
[Link] (1 responses)
Posted Jul 25, 2023 11:17 UTC (Tue)
by intelfx (subscriber, #130118)
[Link]
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/...
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
The fix that went into 6.4.6 checks for microcode version 0x08701032 for my CPU (Ryzen 3700X, family 0x17, model 0x71) and that version doesn't seem to be included in the microcode updates in linux-firmware.git. I'm still running microcode 0x08701021 even after the update.
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability
Zenbleed: an AMD Zen 2 speculative vulnerability