News Intel/ARM/AMD: Sicherheitslücken Meltdown & Spectre V1, V2 etc. (Links in Post 1)

CVE-2025-2884 wird mit AGESA ComboAM5 PI 1.2.0.3e für AM5 geschlossen. Für erste Mainboards ist ein entsprechendes BIOS Update schon verfügbar. Z.B. für ASUS X870E Boards.
 
Ich denke alle da auch Threadripper 7000 betroffen ist.
 
Gigabyte: CERT warnt vor UEFI-Sicherheitslücke von Mainboards (heise)

Der BIOS-Hersteller AMI hat gegenüber dem CERT angedeutet, dass das Unternehmen die Schwachstellen bereits früher nach vertraulichen Meldungen ausgebessert hat, sie nun jedoch in der Gigabyte-Firmware wieder aufgetaucht seien und jetzt öffentlich bekannt gemacht wurden.

Die Liste habe ich noch nicht gefunden:

Die Binarly-Sicherheitsmitteilungen enthalten eine Liste von mindestens 80 betroffenen Gigabyte-Mainboards, teils auch älteren. Eine stichprobenartige Prüfung zeigt, dass Gigabyte offenbar zahlreiche BIOS-Updates im Juni veröffentlicht hat, die die Schwachstellen ausbessern.
 
Habe die Listen gefunden:


CVE-2025-7026 bis CVE-2025-7029 unter Details

Das Bild von heise (AM4) ist da missverständlich, wenn ich es richtig sehe sind nur Intelboards betroffen.
 
WHITEPAPER: TECHNICAL GUIDANCE FOR MITIGATING TRANSIENT SCHEDULER ATTACKS | REVISION 2.0 | JULY 20252
Transient Scheduler Attacks (TSA) are new speculative side channel attacks related to the execution timing of instructions under
specific microarchitectural conditions. In some cases, an attacker may be able to use this timing information to infer data from
other contexts, resulting in information leakage.
AMD is releasing updated CPU microcode which must be used in conjunction with operating system (OS) and hypervisor software
updates to help mitigate TSA.
This paper provides technical background regarding TSA and how these attacks can be mitigated. AMD encourages developers to
review this guidance and determine the appropriate mitigations for their environments.
As of the date of this whitepaper, only Family 19h products are known to be vulnerable to TSA.
TECHNICAL GUIDANCE FOR MITIGATING TRANSIENT SCHEDULER ATTACKS

AMD enthüllt eine neue Klasse von Schwachstellen in seinen Zen 3- und Zen 4-Prozessoren - blog.desdelinux.net
 
RDSEED Failure on AMD “Zen 5” Processors

AMD ID: AMD-SB-7055
Potential Impact: Loss of Confidentiality and Integrity
Severity: High

Summary ​

AMD was notified of a bug in “Zen 5” processors that may cause the RDSEED instruction to return 0 at a rate inconsistent with randomness while incorrectly signaling success (CF=1), indicating a potential misclassification of failure as success. This issue was initially reported publicly via the Linux kernel mailing list and was not submitted through AMD’s Coordinated Vulnerability Disclosure (CVD) process.

AMD has determined that the 16-bit and 32-bit forms of the RDSEED instruction on “Zen 5” processors are affected. The 64-bit form of RDSEED is not affected. AMD plans to release mitigations for this vulnerability.
 
GPUHammer: Rowhammer Attacks on GPU Memories are Practical

GPUHammer: Rowhammer Attacks on GPU Memories are Practical​



AMD ID: AMD-SB-7049
Potential Impact: N/A
Severity: N/A - Informational



Summary​

Researchers were able to trigger the first rowhammer bitflips on discrete graphics with Graphics Double Data Rate 6 (GDDR6) memory. For GDDR6, AMD does support a Graphics Error Correcting Code (ECC) feature. This will help to protect the system from bit-flips triggered by rowhammer attacks, as the corruption will be detected and either reported or fixed depending on if the ECC error is uncorrectable or correctible.

The following AMD products support GDDR6 memory:

AMD Radeon™ Series Graphics Products

  • AMD Radeon™ AI PRO 9000 Series Graphics Products
  • AMD Radeon™ PRO VII
  • AMD Radeon™ PRO W5000 Series Graphics Products
  • AMD Radeon™ PRO W6000 Series Graphics Products
  • AMD Radeon™ PRO W7000 Series Graphics Products
  • AMD Radeon™ PRO WX Vega Series Graphics Cards
  • AMD Radeon™ RX 5000 Series Graphics Products
  • AMD Radeon™ RX 6000 Series Graphics Products
  • AMD Radeon™ RX 7000 Series Graphics Products
  • AMD Radeon™ RX 9000 Series Graphics Products
  • AMD Radeon™ RX Vega Series Graphics Cards
  • AMD Radeon™ VII
 
Was es nicht alles gibt ... ;)
 
Zurück
Oben Unten