Almost unfixable “Sinkclose” bug affects hundreds of millions of AMD chips

Discussion in 'hardware' started by stapp, Aug 10, 2024.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    27,775
    Location:
    UK
    https://arstechnica.com/security/20...bug-affects-hundreds-of-millions-of-amd-cpus/
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Not sure how easy to exploit this is, but still a pretty serious bug/backdoor. And it has been around for almost 20 years. I also wonder if the Windows OS could somehow tackle such an exploit?
     
  3. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,660
    Location:
    Triassic
    Yesterday on an infosec video call, it was revealed that to exploit this vulnerability, a previous successful attack on the operating system and its kernel must have taken place. Attackers need to obtain permissions for the ring 0. The malware is executed in the system management mode and thus in the ring -2 and below the ring 0. AMD stresses that extensive access is necessary.

    MS should be able to tackle this exploit due to the way their OS is structured - though no specifics given at the time.
     
  4. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,251
    Location:
    Member state of European Union
    This is a standard that for this kind of vulnerability, so this only needed to be confirmed rather than "revealed".
    However each major operating system like macOS, Windows, or Linux has countless not-yet-publicly known vulnerabilities allowing to bypass into kernel-mode... And they are quite cheap to buy given that major exploit buyer gave only like $30k per such Windows exploit a year or two ago and even temporarirly stopped buying them even at that price.

    You can fix one such vulnerability, but countless will remain. Especially if you use Windows using non-SUA account.
     
  5. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,660
    Location:
    Triassic
    AMD issued updates today for some of their EPYC and Ryzen microprocessors. There is a list of systems receiving updates on the AMD website.
     
  6. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,951
    Location:
    Outer space
    Here is AMDs advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html
    Note that only server hardware gets separate microcode updates. Consumer/client hardware(includes business) only gets a PI update. Then you have to wait for the manufacturer to integrate and release it as a BIOS/UEFI update. If you're lucky enough to get one..

    Exactly.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    I assume malware most likely needs to load/install a driver in order to get full kernel access. So perhaps Windows could harden PatchGuard to restrict drivers even more.

    You're probably talking about a browser exploit that can use a Windows OS exploit to break the sandbox and get into admin-mode? I'm not sure if this enough to be able to abuse this AMD CPU bug though.
     
  8. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,951
    Location:
    Outer space
    AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all
    https://www.theregister.com/2024/08/20/amd_sinkclose_ryzen_3000/
    While I'm not a fan of Intel, at least they provide longer support.
     
  9. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,492
    GIGABYTE's Latest AGESA BIOS Fixes Sinkclose Vulnerability of AMD Desktop Processors
    Aug 23, 2024
    https://www.gigabyte.com/Press/News/2212
    ----------
    The F67c released yesterday =
    https://www.gigabyte.com/Motherboard/B450M-DS3H-V2-rev-1x/support#support-dl-bios
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.