this post was submitted on 15 Nov 2023
1 points (100.0% liked)

AMD

26 readers
4 users here now

For all things AMD; come talk about Ryzen, Radeon, Threadripper, EPYC, rumors, reviews, news and more.

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 1 year ago (3 children)

As the commenter under that article stated, it's odd that AMD designed SEV in a way that the initial value is enough to pass the authentication.

[–] [email protected] 1 points 1 year ago

cmon, thats quite normal

- the NSA, probably

[–] [email protected] 1 points 11 months ago (1 children)

This is incorrect, the "default value" is a poorly translated example from the german article - this exploit does NOT rely on resetting any SEV-specific memory or similar.

[–] [email protected] 1 points 11 months ago (1 children)

I re-read the article and the original ComputerBase article, and I think I have a better understanding of it now. You can read my update and let me know if I'm still misunderstanding it.

[–] [email protected] 1 points 11 months ago

Yes, you understood correctly.

This is also not a rare occurence, you can programmatically find locations in a binary where un-doing a cached write allows manipulating control flow - there are more examples in the paper.

You will likely find these locations (called gadgets) in just about every binary - not because all devs are stupid and set the default to the "exploitable" case, but because this is how compiler code generation pans out in the grand scheme of things.

[–] [email protected] 0 points 1 year ago (1 children)

It's similar to when Mac OS accepted an empty password at login.

Pretty sure this sub will use the same defense as /r/apple did.

[–] [email protected] 1 points 11 months ago

I haven't seen anyone defend AMD with this, so I think we're doing okay for now.