Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <32e961ce-1088-4e21-803a-3539a0ceaa3a@gmail.com>
Date: Wed, 5 Feb 2025 21:22:21 -0600
From: Jacob Bachmeyer <jcb62281@...il.com>
To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com>
Subject: Re: AMD Microcode Signature Verification Vulnerability

On 2/4/25 04:10, Solar Designer wrote:
> On Wed, Jan 22, 2025 at 07:52:48AM -0800, Tavis Ormandy wrote:
>> [...]
>>
>> AMD SEV-SNP users can verify the fix by confirming TCB values for SNP in
>> their attestation reports (can be observed from a VM, consult AMD's
>> security bulletin for further details).
>>
>> [...]
> The corresponding AMD security bulletin is:
>
> https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
>
>> [...] Additionally, an SEV firmware update
>> is required for some platforms to support SEV-SNP attestation. Updating
>> the system BIOS image and rebooting the platform will enable attestation
>> of the mitigation. A confidential guest can verify the mitigation has
>> been enabled on the target platform through the SEV-SNP attestation
>> report.

[*raises hand*]

If an attacker is able to control the hypervisor (necessary to load 
rogue microcode) and the processor microcode, how can the VM trust that 
it is actually verifying that attestation and not being sent down a "oh 
yes it is exactly what you want it to be" garden path?

Do the instructions necessary to obtain and verify that attestation not 
use microcode at all?


-- Jacob


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.