nzmaa@lemy.lol to Technology@lemmy.worldEnglish · 3 months ago‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infectionswww.wired.comexternal-linkmessage-square47fedilinkarrow-up11arrow-down10cross-posted to: technology@beehaw.org
arrow-up11arrow-down1external-link‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infectionswww.wired.comnzmaa@lemy.lol to Technology@lemmy.worldEnglish · 3 months agomessage-square47fedilinkcross-posted to: technology@beehaw.org
minus-squareBlackLaZoR@kbin.runlinkfedilinkarrow-up0·3 months ago it may be possible for an attacker with ring 0 access to modify the configuration of System Management Mode (SMM) even when SMM Lock is enabled. If attacker has a ring 0 access he can already screw you up any way he wants
minus-squareSzethFriendOfNimi@lemmy.worldlinkfedilinkEnglisharrow-up0·3 months agoTrue. This does allow for persistent recurring infection post clean and cold boot. Interesting flaw to keep an eye on.
minus-squareVik@lemmy.worldlinkfedilinkEnglisharrow-up0·3 months agothat’s all well and good, I was just responding to someone who wanted the list of affected products
minus-squareWHYAREWEALLCAPS@fedia.iolinkfedilinkarrow-up0·3 months agoIt only mentions ring 0 access in your link, ergo they responded to your post because it was the most appropriate. At least that’s how I see it.
If attacker has a ring 0 access he can already screw you up any way he wants
True. This does allow for persistent recurring infection post clean and cold boot.
Interesting flaw to keep an eye on.
that’s all well and good, I was just responding to someone who wanted the list of affected products
It only mentions ring 0 access in your link, ergo they responded to your post because it was the most appropriate. At least that’s how I see it.