|
|
Message-ID: <hjcvYS5JbRM3pUNh@aceecat.org> Date: Fri, 31 Oct 2025 10:20:45 -0700 From: nightmare.yeah27@...ecat.org To: oss-security@...ts.openwall.com Subject: Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability On Thu, Oct 30, 2025 at 04:25:29PM +0000, Eddie Chapman wrote: > Even just for 1 AMD machine, a BIOS updates is harder than it should > be, since almost none of the major motherboard manufacturers have > managed to implement the ability to somehow save a set of BIOS > settings that can then be reloaded after updating (or at least one > that works reliably). Meaning each machine's BIOS needs to be > completely reconfigured each time, very time consuming and > problematic for some deployments. This is ancient, pre EFI and etc etc ... but it may be a start for someone. https://savannah.nongnu.org/projects/biosconfig/ -- Ian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.