On 13/03/2025 3:55 am, Solar Designer wrote:
> On Sat, Mar 08, 2025 at 01:28:07AM +0000, Andrew Cooper wrote:
>> On 06/03/2025 4:48 am, Solar Designer wrote:
>>> On Thu, Mar 06, 2025 at 04:11:25AM +0000, Andrew Cooper wrote:
>>>> This issue wins points for spite, because the highest risk users are the
>>>> ones who were taking proactive steps to try and improve their security,
>>>> betting that AMD's patchloader crypto was sound.
>>> OK, so this is to protect legitimate sysadmins from loading malicious
>>> microcode inadvertently or via a supply chain attack.  Makes sense.
>> Sorry for the delay, I knew there was a distro formally doing this, but
>> I'd lost track of the links.
>>
>> https://github.com/divestedcg/real-ucode which is packaged for Arch as
>> https://aur.archlinux.org/packages/amd-real-ucode-git (and an equivalent
>> Intel package).
> Thank you for these followup postings, Andrew!  They're very helpful.
>
> I have one late nitpick to add - as jericho @attritionorg pointed out on
> Twitter, the Subject line here gives an incorrect CVE number.  The
> correct one is CVE-2024-36347.

Oops, my mistake.  (This is what happens when the sources of information
try to block things like copy/paste, and I'm in a rush.)

However, happy patch Tuesday.

Zen5 CPUs have been breached too, and
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html
has been quietly updated to reflect this.

~Andrew

Reply via email to