|
Message-ID: <Z5BYg9WPFBF7JBEB@thinkstation.cmpxchg8b.net> Date: Tue, 21 Jan 2025 18:31:31 -0800 From: Tavis Ormandy <taviso@...il.com> To: Open Source Security <oss-security@...ts.openwall.com> Subject: AMD Microcode Signature Verification Vulnerability It looks like an OEM leaked the patch for a major upcoming CPU vulnerability, i.e. "AMD Microcode Signature Verification Vulnerability": https://rog.asus.com/motherboards/rog-strix/rog-strix-x870-i-gaming-wifi/helpdesk_bios/ I'm not thrilled about this - the patch is *not* currently in linux-firmware, so this is the only publicly available patch. However, other people are discussing how to extract them: https://winraid.level1techs.com/t/offer-intel-amd-via-cpu-microcode-archives-1995-present/102857/53 Tavis. -- _o) $ lynx lock.cmpxchg8b.com /\\ _o) _o) $ finger taviso@....org _\_V _( ) _( ) @taviso
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.