Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

    • @[email protected]
      link
      fedilink
      English
      51 year ago

      Any news on the “pro” line? They were installed on business PCs and had additional security features built in. For instance there is a 3600 pro model.

    • @[email protected]
      link
      fedilink
      English
      141 year ago

      Consumer usage is not really concerned by the attack scenario of this vulnerability from what I understand. The prerequisite is to have access to the bios so it’s already game over at this point.

      • @[email protected]
        link
        fedilink
        English
        51 year ago

        Chip makes should not only treat customer CPUs as possibly-business hardware when adding shit like (Intel) ME, Pluton and (AMD) PSP, but also when patching serious vulnerabilities and providing support!

        • @[email protected]
          link
          fedilink
          English
          31 year ago

          When you pay for enterprise equipment, you are typically paying a premium for longer, more robust support. Consumer products are less expensive because they don’t get this support.

          • @[email protected]
            link
            fedilink
            English
            11 year ago

            But they are already pretending for whatever reason that these are suitable for enterprises, by always includingthe aformentioned remote control components!

        • @[email protected]
          link
          fedilink
          English
          11 year ago

          Agreed, firmware security by chip manufacturers has been underwhelming to say the least and we can blame them for that. But in this specific instance I still don’t see the benefit of a fix for consumer usage. Companies have a responsibility and accountability toward their users, so a fix is due, for personal laptops/PCs the threat is toward the owners themselves (activists, diplomats, journalists, etc.). The latter do not buy second hand equipment, and if the firmware is compromised while they own it, they are already in danger.

          • @[email protected]
            link
            fedilink
            English
            1
            edit-2
            1 year ago

            The latter do not buy second hand equipment

            You are assuming activists are well funded in some way, and that they are not repressed.

            This obviously has a benefit for consumer usage too, same as encryption. You’re basically saying consumers don’t need any kind of antivirus either, because it’s not that critical.
            This vuln should have been fixed for consumer hardware too, because it basically permanently taints all hardware that is vulnerable to it. And what makes it so hard to release patches for consumer hardware, when patches were already made for the same generations of enterprise hardware? Basically the majority of the work has been done already

            • @[email protected]
              link
              fedilink
              English
              11 year ago

              I’m not saying this is a small issue and nothing should be done. I just noted that the issue is not as big as some other hardware-based vulnerabilities we encountered in the past. And every threat model calls for a corresponding counter-measure.

              You are assuming activists are well funded in some way, and that they are not repressed. I’m assuming they are repressed, which is why they have people that buy and configure their equipment and hand it to them so that it hasn’t been tampered with. If you cannot afford that your should use your computer as if it was compromised.

              You’re basically saying consumers don’t need any kind of antivirus either Where did I write that?

              And what makes it so hard to release patches for consumer hardware. AMD focusing on where its money’s at and OEM/motherboard manufacturers being cheap and lazy and not pushing forward updates when they have them.

      • @[email protected]
        link
        fedilink
        English
        61 year ago

        Sure, but that feels a little bit like saying “We don’t need guards inside the prison, because we already have them patrolling around the perimeter.”

  • BrightCandle
    link
    fedilink
    English
    271 year ago

    AMD has unfortunately a long history of abandoning products before its reasonable on its graphics division. Its not really acceptable, up until earlier this year my NAS/server was running a 3600 and its only for power saving purposes I changed that as its still a very workable CPU in that role.

    • @[email protected]
      link
      fedilink
      English
      121 year ago

      Er I’m still running a FX-8350 as a gaming machine (not AAA games obviously). I had another one as a host for a few VMs and it was more than enough till the motherboard went. One day I’ll upgrade I guess.

      • @[email protected]
        link
        fedilink
        English
        41 year ago

        I moved from an FX8350 to a R5 5600G a few years ago, having run it for about 9 years. Initially I didn’t think I’d notice much difference, but frankly it’s an entirely different ballgame.

  • @[email protected]
    link
    fedilink
    English
    821 year ago

    Attackers need to access the system kernel to exploit the Sinkclose vulnerability, so the system would have to already be compromised. The hack itself is a sophisticated vector that is usually only used by state-sponsored hackers, so most casual users should take that into account.

    So it’s a vulnerability that requires you to.already have been compromised. Hardly seems like news.

    I can understand AMD only patching server chips that by definition will be under greater threat. On the other hand it’s probably not worth the bad publicity not to fix more.

    • @[email protected]
      link
      fedilink
      English
      131 year ago

      That being said it builds up vulnerabilities in anti-cheats to another beautiful crowstrike like domino cluster fuck

    • @[email protected]
      link
      fedilink
      English
      151 year ago

      It’s important because it allows them to directly modify the CPU’s microcode. Basically, the CPU has its own set of instructions, called microcode, which controls how the chip functions on a physical level. If they manage to change your microcode, even a full system reformat won’t kill the virus; You’ll need to either re-flash the CPU (which is not something the standard user or even power user will know how to do) or replace the entire CPU.

    • @[email protected]
      link
      fedilink
      English
      301 year ago

      The reason that this is news is because it allows malware to embed itself into the processor microcode once kernel is breached. IE: If it is exploited for compromise, you either have to have the knowledge and hardware to reset the processor microcode manually (Requires an SPI flash tool) or you toss the hardware entirely. There’s no just ‘blow the drive away and reinstall the OS’ solution available.

      • @[email protected]
        link
        fedilink
        English
        181 year ago

        This sounds weird. I was in the impression that operating systems load updated cpu microcode at every boot, because it does not survive a power cycle, and because the one embedded in the BIOS/UEFI firmware is very often outdated. But then how exactly can a virus persist itself for practically forever?

        • Norah (pup/it/she)
          link
          fedilink
          English
          51 year ago

          The OS can’t get to the point of loading cpu microcode without that outdated, embedded microcode. The reason it can persist is because there aren’t a lot of good ways to see what that UEFI microcode actually is once it’s installed. Plus, only the UEFI tells you that it has successfully updated itself. There is no other more authoritative system to verify that against. So the virus could just lie and say it’s gone and you would never know. Hence needing to treat it as the worst case scenario, that it never leaves.

      • @[email protected]
        link
        fedilink
        English
        151 year ago

        And that introduces a specific type of supply chain threat: someone who possesses a computer can infect their own computer, sell it or transfer it to the target, and then use the embedded microcode against the target, even if the target completely reformats and reinstalls a new OS from scratch.

        That’s not going to affect most people, but for certain types of high value targets they now need to make sure that the hardware they buy hasn’t already been infected in the supply chain.

    • @[email protected]
      link
      fedilink
      English
      21 year ago

      I personally agree. I think it’s being somewhat overhyped. If step one is physical access to get things rolling… like for sure some machines are in more public areas than others. But for me, someone would have to break into my house first, then access my machine, just to run exploits later. The exploit is pretty massive, but I think needs to be tempered with “first they need physical access”. Because physically controlling machines has always been number 1 for security.

  • bruhduh
    link
    fedilink
    English
    111 year ago

    Basically, reflash spi chips and it’ll be gone, and to be infected by that, person gotta have physical access to hardware he hacks, and physical access is root access as always has been

    • TheHolmOP
      link
      fedilink
      English
      11 year ago

      Nope. You do not need physical access for it, just root access. and you HW is compromised with only means to recover it is SPI flashing of CPU.

  • @[email protected]B
    link
    fedilink
    English
    8
    edit-2
    1 year ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    IP Internet Protocol
    NAS Network-Attached Storage
    SSD Solid State Drive mass storage

    3 acronyms in this thread; the most compressed thread commented on today has 4 acronyms.

    [Thread #919 for this sub, first seen 12th Aug 2024, 20:35] [FAQ] [Full list] [Contact] [Source code]

  • Harvey656
    link
    fedilink
    English
    211 year ago

    So I have a 3700x, I’ve read about the vulnerability but don’t fully understand it. How at risk am I?

    • @[email protected]
      link
      fedilink
      English
      29
      edit-2
      1 year ago

      If an attacker gets access to your system, they will be able to ensure you can’t get rid of their access

      It will persist across operating system installs

      However, this requires them to get access first

      • Harvey656
        link
        fedilink
        English
        71 year ago

        Sounds like it’s time for an upgrade. Never know what kind of weirdos are out there. Thanks for the information.

    • @[email protected]
      link
      fedilink
      English
      4
      edit-2
      1 year ago

      In short, if you’re pwned once, you are pwn3d f0r3v#rrrrreeeheehaahaahaa*cough**cough*


      These are the kinds of exploits you use to create APT (Advanced Persistent Threats).

    • @[email protected]
      link
      fedilink
      English
      251 year ago

      If they get root or admin they can hack the chip itself.

      But minor exploits, nada, no issue, you good. Gotta get root to make it happen.

      Problem is if you, as they say, get got, you have no way of knowing if they’re in your CPU, and no way to fix if they did – basically gotta trash it and replace.

    • @[email protected]
      link
      fedilink
      English
      21 year ago

      Not particularly. The exploit requires ring 0 access, if an attacker managed to get that, you are screwed already.

  • @[email protected]
    link
    fedilink
    English
    25
    edit-2
    1 year ago

    Yay, another BIOS update!

    I am getting so sick of all these BIOS updates because of all these security vulnerabilities all the time. It is so tiring having to set up my settings all over again all of the time. Earlier this year, or maybe it was last year, it felt like every month or two there was a new BIOS update for a new security vulnerability.

      • @[email protected]
        link
        fedilink
        English
        10
        edit-2
        1 year ago

        Depending on your BIOS and/or motherboard, you can’t restore them between versions. The point of clearing the BIOS settings after flashing a new version is to ensure that you only have values that are expected, which is why restoring backups can often be blocked between versions.

  • @[email protected]
    link
    fedilink
    English
    201 year ago

    so that means you can internally flash the bios chip from the os?

    would be cool if there were coreboot builds for these platforms, this exploit seems pretty useful

    • 0^2
      link
      fedilink
      English
      51 year ago

      Wait yeah can someone explain why this exploit couldn’t be used to say rewrite it to support coreboot and turn this into a good thing?

      • @[email protected]
        link
        fedilink
        English
        1
        edit-2
        1 year ago

        because you need the coreboot people to write firmware that can initialise the system, and that probably takes a lot of reverse engineering

        I don’t know much about this, but I assume there’s little to no effort for corebooting on the amd side, I’ve only seen intel platforms with coreboot

    • astrsk
      link
      fedilink
      201 year ago

      My threadripper 1950x is from 2017… and is the cpu powering my primary hypervisor perfectly fine. That’s not 18 years ago, that’s not even 8 years ago.

    • @[email protected]
      link
      fedilink
      English
      411 year ago

      What are you on about?

      Ryzen 3xxx series processors are still being sold new today

      The oldest zen processors are only just over half a decade old—a consumer CPU should be expected to be in service at least double that time.

      • @[email protected]
        link
        fedilink
        English
        11 year ago

        AMD is producing them new or your local shop us? Because AMD doesnt care about your local tech shop dead stock.

        • @[email protected]
          link
          fedilink
          English
          31 year ago

          Maybe they should, and also care about the many people still using these processors that are not very old.

    • @[email protected]
      link
      fedilink
      English
      511 year ago

      They aren’t patching CPUs that were released 5 years ago.

      They should be patching back to Ryzen 1 since those are still perfectly good CPUs. 5-7 years really isn’t that old considering how little improvement there is with each generation.

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        Sure, not much per gen, but if you compare say a 1700x vs the current 9700x, you are roughly looking at a 3x improvement in single and multicore performance increase.

        • @[email protected]
          link
          fedilink
          English
          151 year ago

          Most of desktop users don’t care at all about these gains. Slap in normal ram and an SSD and a 1000 series Ryzen is ready to be a run of the mill desktop, that browses and can show media no problem.

          I care! But I’m a power user. Most aren’t.

          • @[email protected]
            link
            fedilink
            English
            41 year ago

            I suppose that is true. Intel seems to think so as well as their low power n100 is about the performance of a 1500x.

    • TheHolmOP
      link
      fedilink
      English
      71 year ago

      3600 was released in 2019. And it they was making it for at least 2 years.