|
Message-ID: <20230725100133.GA6563@openwall.com> Date: Tue, 25 Jul 2023 12:01:33 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2023-20593: A use-after-free in AMD Zen2 Processors On Mon, Jul 24, 2023 at 07:28:18AM -0700, Tavis Ormandy wrote: > Hello, this is CVE-2023-20593, a use-after-free in AMD Zen2 processors. An impressive finding, indeed! On a related note: A few months earlier, Tavis found a _different_ AMD Zen1/Zen2 bug, which turned out to have already been known and patched in AMD microcode updates for many affected parts (but apparently not all). There's also a kernel level workaround, which was included into Linux in response to Tavis' rediscovery of that issue. Here are the links for that other issue/fix, for distros to double-check they're fixing this one as well: x86: AMD Zen2 ymm registers rolling back (Feb 21, 2023) https://lore.kernel.org/lkml/Y%2FW4x7%2FKFqmDmmR7@thinkstation.cmpxchg8b.net/ x86/CPU/AMD: Disable XSAVES on AMD family 0x17 (Mar 8, 2023) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0563468eeac88ebc70559d52a0b66efc37e4e9d Once again, it's a different bug - not the one that this oss-security thread is mainly about - but both have cross-process security impact, affect similar AMD CPUs, and need to be taken care of by similar means (microcode updates or/and disabling of affected CPU features in the kernel). Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.