this post was submitted on 10 Aug 2024
49 points (90.2% liked)

Cybersecurity

5404 readers
76 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

AMD is warning about a high-severity CPU vulnerability named SinkClose that impacts multiple generations of its EPYC, Ryzen, and Threadripper processors. The vulnerability allows attackers with Kernel-level (Ring 0) privileges to gain Ring -2 privileges and install malware that becomes nearly undetectable.

Tracked as CVE-2023-31315 and rated of high severity (CVSS score: 7.5), the flaw was discovered by IOActive Enrique Nissim and Krzysztof Okupski, who named privilege elevation attack 'Sinkclose.'

Full details about the attack will be presented by the researchers at tomorrow in a DefCon talk titled "AMD Sinkclose: Universal Ring-2 Privilege Escalation."

you are viewing a single comment's thread
view the rest of the comments
[–] Flatfire@lemmy.ca 7 points 1 month ago (9 children)

No fix planned for Ryzen 3000 is a disappointment

[–] antonionardella@lemmy.world 2 points 1 month ago

How it that conceivable?

Not that it changes anything, but it might be worth to voice our concerns

I found this thread on their forum:

https://community.amd.com/t5/processors/no-fix-for-new-sinkclose-exploit-on-3000-series-cpus/td-p/701290

load more comments (8 replies)