![]() |
|
Message-ID: <fb77b285-53f4-46ef-a9a7-e5ab60706da7@citrix.com> Date: Thu, 6 Mar 2025 18:11:21 +0000 From: Andrew Cooper <andrew.cooper3@...rix.com> To: Solar Designer <solar@...nwall.com> Cc: oss-security@...ts.openwall.com Subject: Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability On 06/03/2025 4:48 am, Solar Designer wrote: >> Under Host UEFI Secure Boot, there is a security boundary between kernel >> code and root. Part of the requirement is "no unsigned code running >> privileged", and while this is technically a grey area (the malicious >> blob is signed; it's just not signed by AMD), it's also easy to argue >> that root definitely shouldn't be able to load a malicious microcode, >> just like it shouldn't be able to swap out the kernel with an unsigned >> one and reboot. > Yes, but can't Xen's and the kernel's new protections be bypassed by MSR > access via /dev/cpu/*/msr? The AMD microcode loader released by Google > now doesn't appear to require more than that: > > https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/loader.c For Linux, /dev/cpu/*/msr isn't available when lockdown mode is active. For Xen, guests can't load microcode at all (writes to the relevant MSRs are simply swallowed). Actually loading microcode is done via hypercall, restricted to privileged domains, and digest checking can't be disabled without a reboot (or a livepatch, which in a UEFI-SB model needs to itself be signed). Answering Bastian's question from the other fork of this thread (sorry, I'm not CC'd). Maintaining the hash list is a concern, but in the immediate term, the relevant maintainers in Linux and Xen. Something better is being worked on, but there are challenges beyond just technical ones. ~Andrew
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.