fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#zenbleed

0 posts0 participants0 posts today
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> discloses slew of high severity <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> for <a href="https://hachyderm.io/tags/Zen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zen</span></a> systems, from the original Zen chips to the latest <a href="https://hachyderm.io/tags/Zen4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zen4</span></a> <a href="https://hachyderm.io/tags/CPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPU</span></a>, that attacks <a href="https://hachyderm.io/tags/BIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOS</span></a> chips, we finally have a <a href="https://hachyderm.io/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> fix. AMD is patching the vulnerabilities through new versions of <a href="https://hachyderm.io/tags/AGESA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AGESA</span></a>, for <a href="https://hachyderm.io/tags/Zen2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zen2</span></a>-based chips, in particular, many of these new AGESAs also patch Zenbleed, including <a href="https://hachyderm.io/tags/Epyc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Epyc</span></a> <a href="https://hachyderm.io/tags/Server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Server</span></a> chips <a href="https://bit.ly/3I1JKds" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3I1JKds</span><span class="invisible"></span></a> <a href="https://www.tomshardware.com/pc-components/cpus/amd-discloses-slew-of-high-severity-security-vulnerabilities-for-zen-chips-that-attack-bios-chips-updates-aim-to-patch-bugs-finally-fix-zenbleed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/pc-components</span><span class="invisible">/cpus/amd-discloses-slew-of-high-severity-security-vulnerabilities-for-zen-chips-that-attack-bios-chips-updates-aim-to-patch-bugs-finally-fix-zenbleed</span></a></p>
Elias Griffin<p>Cybersecurity Advisory: Lenovo and many other manufacturers have bumped the AMD Zen2 CPU patch due Jan 6th, the flaw dubbed Zenbleed, to another 5 months in some cases, unbelievable!</p><p><a href="https://support.lenovo.com/us/en/product_security/ps500571-amd-cross-process-information-leak" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.lenovo.com/us/en/produ</span><span class="invisible">ct_security/ps500571-amd-cross-process-information-leak</span></a></p><p>If you are on FreeBSD I suggest you download either Freaky's Zenbleed Workaround here:</p><p><a href="https://gist.github.com/Freaky/2560975d3c94246b86f464b8be75c967" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/Freaky/2560975</span><span class="invisible">d3c94246b86f464b8be75c967</span></a></p><p>Or my FreeBSD Security Suite here:<br><a href="https://quadhelion.dev/elias/harden-freebsd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">quadhelion.dev/elias/harden-fr</span><span class="invisible">eebsd</span></a></p><p>OR</p><p><a href="https://github.com/wravoc/harden-freebsd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/wravoc/harden-freeb</span><span class="invisible">sd</span></a></p><p>Which includes an entire hardening suite and CPU vulnerability checker by Stéphane Lesimple which you can singly grab here:</p><p><a href="https://github.com/speed47/spectre-meltdown-checker" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/speed47/spectre-mel</span><span class="invisible">tdown-checker</span></a></p><p><a href="https://infosec.space/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.space/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> <a href="https://infosec.space/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://infosec.space/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://infosec.space/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.space/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
IT News<p>This Week in Security: 1Password, Polyglots, and Roundcube - This week we got news of a security incident at 1Password, and we’re certain we ar... - <a href="https://hackaday.com/2023/10/27/this-week-in-security-1password-polyglots-and-roundcube/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/10/27/this-w</span><span class="invisible">eek-in-security-1password-polyglots-and-roundcube/</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/1password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1password</span></a> <a href="https://schleuss.online/tags/roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roundcube</span></a> <a href="https://schleuss.online/tags/polyglot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>polyglot</span></a> <a href="https://schleuss.online/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
DarkCyberman<p><span class="h-card"><a href="https://infosec.exchange/@merill" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>merill</span></a></span> I dislike the additional dependency on Microsoft managed infrastructure. Their track record isn’t great lately given <a href="https://nerdculture.de/tags/solarwinds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>solarwinds</span></a>, <a href="https://nerdculture.de/tags/bluebleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bluebleed</span></a> and their e-mail/key hack. I can’t even find a reasonable statement about <a href="https://nerdculture.de/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> for Azure.</p>
Christian Blichmann🇺🇦<p>Pretty good video to watch on the <a href="https://infosec.exchange/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> vulnerability, feat. Tacos Ormandy:<br><a href="https://youtu.be/neWc0H1k2Lc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/neWc0H1k2Lc</span><span class="invisible"></span></a></p>
Melroy van den Berg<p>When looking at all the CPU vulnerabilities in the recent years even until this day. We see mitigations taking place in microcode or OS level. But the performance impact is huge! Sometimes 30%-50% decrease in performance on specific tasks like databases!<br>Question: can we get some compensation as consumer? Since both Intel and AMD sold hardware that doesn't give the promised results.<br><a href="https://mastodon.melroy.org/tags/specre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>specre</span></a> <a href="https://mastodon.melroy.org/tags/meltdown" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meltdown</span></a> <a href="https://mastodon.melroy.org/tags/hertzbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hertzbleed</span></a> <a href="https://mastodon.melroy.org/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> <a href="https://mastodon.melroy.org/tags/Inception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Inception</span></a> <a href="https://mastodon.melroy.org/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.melroy.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.melroy.org/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://mastodon.melroy.org/tags/compensation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compensation</span></a> <a href="https://mastodon.melroy.org/tags/money" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>money</span></a></p>
lp0 on fire :unverified:<p>The <a href="https://social.linux.pizza/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> kernel wants, for my CPU (Ryzen 3600), microcode revision 0x8701032. The latest available (only via BIOS updates, not linux-firmware) is 0x8701030, and the kernel complains about it:</p><p>“Zenbleed: please update your microcode for the most optimal fix”</p><p><a href="https://social.linux.pizza/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> <a href="https://social.linux.pizza/tags/Ryzen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ryzen</span></a> <a href="https://social.linux.pizza/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a></p>
Andrei G. :unverified:<p><a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a> added <a href="https://fosstodon.org/tags/Zenbleed" class="mention hashtag" rel="tag">#<span>Zenbleed</span></a> fix for <a href="https://fosstodon.org/tags/SteamDeck" class="mention hashtag" rel="tag">#<span>SteamDeck</span></a>.</p><p>You&#39;ll ask yourself: what, wasn&#39;t this fixed last month? Yes, it was but not for the Steam Deck APU - the CPU model was missed in the Zenbleed erratum list. The fix is going to hit v6.5-rc6.</p><p><a href="https://www.phoronix.com/news/Linux-Zenbleed-Steam-Deck" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Linux-Zenble</span><span class="invisible">ed-Steam-Deck</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a> Kernel Updated To Add <a href="https://fosstodon.org/tags/Zenbleed" class="mention hashtag" rel="tag">#<span>Zenbleed</span></a> Fix For Valve&#39;s <a href="https://fosstodon.org/tags/SteamDeck" class="mention hashtag" rel="tag">#<span>SteamDeck</span></a> :steamdeck: </p><p><a href="https://www.phoronix.com/news/Linux-Zenbleed-Steam-Deck" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Linux-Zenble</span><span class="invisible">ed-Steam-Deck</span></a></p>
Marcus "MajorLinux" Summers<p>Ooopsie!</p><p>Linux Kernel Updated To Add Zenbleed Fix For Valve's Steam Deck - Phoronix <a href="https://www.phoronix.com/news/Linux-Zenbleed-Steam-Deck" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Linux-Zenble</span><span class="invisible">ed-Steam-Deck</span></a></p><p><a href="https://toot.majorshouse.com/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://toot.majorshouse.com/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://toot.majorshouse.com/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> <a href="https://toot.majorshouse.com/tags/Fix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fix</span></a> <a href="https://toot.majorshouse.com/tags/Valve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Valve</span></a> <a href="https://toot.majorshouse.com/tags/SteamDeck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SteamDeck</span></a> <a href="https://toot.majorshouse.com/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> <a href="https://toot.majorshouse.com/tags/Ryzen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ryzen</span></a> <a href="https://toot.majorshouse.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://toot.majorshouse.com/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> <a href="https://toot.majorshouse.com/tags/GamingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GamingNews</span></a> <a href="https://toot.majorshouse.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
Thomas Hurst<p>I added a known-good microcode check to my <a href="https://hachyderm.io/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://hachyderm.io/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> MSR chicken-bit rc script, and a reminder to check it all again in mid-December.</p><p>I don't have the relevant CPUs to hand to test it directly so do let me know how you get on.</p><p><a href="https://gist.github.com/Freaky/2560975d3c94246b86f464b8be75c967" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/Freaky/2560975</span><span class="invisible">d3c94246b86f464b8be75c967</span></a></p>
FCLC<p><span class="h-card"><a href="https://social.treehouse.systems/@Violet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Violet</span></a></span> This years <a href="https://mast.hpc.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> looks ripe with CPU vulnerabilities. </p><p><a href="https://mast.hpc.social/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> last week for AMD</p><p>today: <br><a href="https://mast.hpc.social/tags/Downfall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Downfall</span></a> for Intel</p><p><a href="https://mast.hpc.social/tags/Inception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Inception</span></a> for AMD</p>
tjhowse<p>Maximum oof:</p><p>&gt; It took a bit of work, but I found a variant that can leak about 30 kb per core, per second.</p><p>There's a nice clear explanation here: <a href="https://lock.cmpxchg8b.com/zenbleed.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lock.cmpxchg8b.com/zenbleed.ht</span><span class="invisible">ml</span></a></p><p> <a href="https://howse.social/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a></p>
Ubuntu Security<p>On the <span class="h-card" translate="no"><a href="https://ubuntu.social/@ubuntu" class="u-url mention">@<span>ubuntu</span></a></span> <a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="tag">#<span>Security</span></a> Podcast this week we look at the AMD <a href="https://fosstodon.org/tags/Zenbleed" class="mention hashtag" rel="tag">#<span>Zenbleed</span></a> vuln plus we cover security updates for the Linux kernel, a high profile OpenSSH vuln and finally Andrei is back covering recent academic research in machine learning safeguards <a href="https://ubuntusecuritypodcast.org/episode-204/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">ubuntusecuritypodcast.org/epis</span><span class="invisible">ode-204/</span></a></p>
Jeroen Ruigrok van der Werven<p>The <a href="https://mastodon.social/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> <a href="https://mastodon.social/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> writeup by <span class="h-card" translate="no"><a href="https://social.sdf.org/@taviso" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>taviso</span></a></span> is some interesting reading:</p><p><a href="https://lock.cmpxchg8b.com/zenbleed.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lock.cmpxchg8b.com/zenbleed.ht</span><span class="invisible">ml</span></a></p>
The Register<p>Unfortunately <span class="h-card"><a href="https://geeknews.chat/@theregister" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>theregister</span></a></span> published misleading and incorrect information that using QEMU (i.e. KVM / Firecracker) mitigates the AMD <a href="https://geeknews.chat/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> exploit.</p><p>_It does not_</p><p>We demo the exploit in a GitHub Action and show how to mitigate it.<br><a href="https://actuated.dev/blog/amd-zenbleed-update-now" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">actuated.dev/blog/amd-zenbleed</span><span class="invisible">-update-now</span></a></p><p><a href="https://geeknews.chat/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a><br>Original tweet : <a href="https://nitter.it/alexellisuk/status/1685952872125460480" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nitter.it/alexellisuk/status/1</span><span class="invisible">685952872125460480</span></a></p>
Hopbox by Unmukti<p>FIxes for AMD 'Zenbleed' CVE-2023-20593 has landed in Debian archives. For stable (bookworm), vulnerability is fixed in Linux version 6.1.38-2 and for old-stable (bullseye) fix is in version 5.10.179-3. </p><p>This only fixes for 2nd gen Epyc CPUs, further CPUs to follow in later releases. Please update your Debian (and downstream) servers.</p><p><a href="https://mastodon.hopbox.net/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.hopbox.net/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> <a href="https://mastodon.hopbox.net/tags/hopbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hopbox</span></a></p>
WinFuture.de<p>Eine neu entdeckte Sicherheitslücke bedroht zahlreiche -AMD-Prozessoren. Die meisten Patches kommen erst in Richtung Jahresende. <a href="https://mastodon.social/tags/Zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenbleed</span></a> <a href="https://winfuture.de/news,137655.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,137655.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Harry Sintonen<p><a href="https://infosec.exchange/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> has released a mitigation for the <a href="https://infosec.exchange/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> vulnerability CVE-2023-20593: "[DSA 5461-1] linux security update"</p><p>This kernel update will identify if the CPU is affected (and no microcode update has been installed) and enable the "chicken bit" if needed.</p><p><a href="https://lists.debian.org/debian-security-announce/2023/msg00153.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lists.debian.org/debian-securi</span><span class="invisible">ty-announce/2023/msg00153.html</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> 'Zenbleed' Bug Leaks Data From Zen 2 <a href="https://mas.to/tags/Ryzen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ryzen</span></a>, <a href="https://mas.to/tags/EPYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EPYC</span></a> CPUs: Most Patches Coming Q4 (Updated) | Tom's Hardware <br><a href="https://mas.to/tags/zenbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zenbleed</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.tomshardware.com/news/zenbleed-bug-allows-data-theft-from-amds-zen-2-processors-patches-released" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/news/zenbleed</span><span class="invisible">-bug-allows-data-theft-from-amds-zen-2-processors-patches-released</span></a></p>