| 14 Nov 2023 |
| @julian:nekover.se changed their display name from Julian to June. | 02:20:57 |
hexa | https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114 | 16:43:25 |
| @vyls:matrix.org left the room. | 18:21:42 |
void | In reply to @hexa:lossy.network https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114 Name of the issue: Redundant Prefix Issue
Description of the issue
Under certain microarchitectural conditions, Intel has identified cases
where execution of an instruction (REP MOVSB) encoded with a redundant
REX prefix may result in unpredictable system behavior resulting in a
system crash/hang, or, in some limited scenarios, may allow escalation
of privilege from CPL3 to CPL0.
This Redundant Prefix Issue is assigned CVE-2023-23583 with a CVSS Base
Score of 8.8 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H.
| 19:29:02 |
zzywysm | https://www.bleepingcomputer.com/news/security/new-cachewarp-amd-cpu-attack-lets-hackers-gain-root-in-linux-vms/ | 20:56:02 |
K900 | Awful headline | 20:57:40 |
K900 | CacheWarp affects only AMD systems with the following processors that come with SEV support:
1st Gen AMD EPYC Processors (SEV and SEV-ES)
2nd Gen AMD EPYC Processors (SEV and SEV-ES)
3rd Gen AMD EPYC Processors (SEV, SEV-ES, SEV-SNP)
According to AMD's advisory, the issue does not impact AMD 4th generation 'Genoa' EPYC processors (Zen 4 microarchitecture).
The company says there is no mitigation for first or second generations of EPYC processors because the SEV and SEV-ES features lack protection functionality for guest VM memory, while the SEV-SNP feature is unavailable. | 20:58:04 |
K900 | Also | 20:58:49 |
K900 | Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity. | 20:58:51 |
K900 | So basically this is only relevant for systems running trusted VMs on an untrusted hypervisor | 20:59:16 |
K900 | Which is exceptionally rare | 20:59:20 |
| 15 Nov 2023 |
| kranzes joined the room. | 12:38:37 |