• Avid Amoeba@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    7 months ago

    Requires kernel-level access. Also AMD is “releasing mitigations,” so is it “unfixable?”

    • Bjornir@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      7 months ago

      If you have kernel access you can already do almost everything so a vulnerability on top of that isn’t that bad since no one should have kernel access to your computer

    • Drathro@dormi.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      I think they meant it as “once infected may be impossible to disinfect.” But it sure doesn’t read that way at first glance.

      • WHYAREWEALLCAPS@fedia.io
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        Did they change it? Because now it says “Allows Deep, Virtually Unfixable Infections” and that seems to say exactly what you are.

        • psud@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          7 months ago

          Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it

      • dosse91@lemmy.trippy.pizza
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        7 months ago

        It means it’s what we in the trade call “a nothingburger”. On Windows you need to explicitly install a malicious driver (which in turn requires to you to disable signature verification), on Linux you’d have to load a malicious kernel module (which requires pasting commands as root, and it would probably be proprietary since it has malware to hide and as every nvidia user knows, proprietary kernel modules break with kernel updates)

        • conciselyverbose@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 months ago

          So install a multiplayer game, it has kernel level anticheat that opens a bunch of security holes, game over.

          Kernel level access is absolutely achievable in the real world.

  • Justin@lemmy.jlh.name
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    7 months ago

    Similar vulnerability threat as the Intel ME bug. Annoying for security-critical applications where you start worrying about hardware security, but virtually no real-world threat. Might be useful for users wishing to disable security processors though.

  • LainTrain@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    More “cybersecurity” clickbait with red/blue/green images of processors and skulls. That’s the real “infection”

  • NotNotMike@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    I mean, I’m not much of a tinfoil hat, but this article feels extremely conveniently timed for Intel, who is currently going through a massive ordeal with their chips. Especially considering that the vulnerability is so extremely difficult to exploit that there’s borderline no story here for 99% of people but the headline will still drive clicks and drama.

    • TheGrandNagus@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      Intel has literally done this, and stuff like it before.

      They back “independent” researchers who twist themselves in knots to make AMD look bad.

      Look up the multiple counts of bullshit from a “research group” called Principled Technologies.

      Sidenote: the guy who ran it was Ryan Shrout, who used to work for PC Perspective, and would usually give favourable reviews to Intel. After leaving Principled Technologies, he got a high up marketing position at… drumroll… Intel!

      Principled Technologies isn’t the only scam “independent researcher” Intel has set up or paid handsomely either.

    • heavy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      7 months ago

      I loathe what part of the security community has become with the stunt hacking and vuln naming. That being said, I doubt it’s some conspiracy. I don’t know all the details but it wouldn’t be exceptional to identify a bug that has existed in processor firmware or legacy code for a long time.

      People are looking at this stuff all the time, both professionally and for fun. You could make the case that it’s inevitable that there will be exploits found that affect a huge population.

      In the end, as long as the layman gets smarter about computer security, the better people will react to vuln drops.

  • Rayspekt@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 months ago

    So what do I exactly need to do if I have ine if the affected CPUs? What specifically do I need to patch?

    • Vik@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      You’ll want to upgrade your system BIOS when your board vendor makes this fix available.