📜 ⬆️ ⬇️

AMD fixes microprocessor microcode vulnerability

Tomorrow, AMD will release an update for the microcode of its microprocessor architecture Piledriver ( AMD Piledriver Family 15h ). The update specializes in eliminating a virtualization code vulnerability that can be used by attackers to escape from a virtual environment to a real OS. Vulnerabilities are exposed to microprocessors with microcode of the latest versions 0x6000832 and 0x6000836, which is used in server versions like Opteron 6300 or client FX series, as well as Athlon.



When a vulnerability is triggered, the microprocessor may interpret a part of the data as executable code and execute it, which will cause the process to crash on the virtual machine. In turn, this will allow to bypass the limitations of the hypervisor and execute the code on a real OS. In the case of the server, an attacker, under the guise of a regular user, on the guest virtual machine can gain access to the entire server, and with maximum privileges.
')
The vulnerability is present in the code associated with the processing of non-masked NMI interrupts and is specific to those versions of the microcode that were mentioned above. With the use of the / proc / cpuinfo command on Linux, you can check the identifier (ID) of the processor running in the system. The update itself will be available for download and manually on the website .

Source: https://habr.com/ru/post/278705/


All Articles