Control: severity -1 grave

On 2025-02-08 10:53, Markus Koschany wrote:
> The following vulnerability was published for amd64-microcode.
> 
> CVE-2024-56161[0]:
> | Improper signature verification in AMD CPU ROM microcode patch
> | loader may allow an attacker with local administrator privilege to
> | load malicious CPU microcode resulting in loss of confidentiality
> | and integrity of a confidential guest running under AMD SEV-SNP.

The Google Security Team has now released a tool [1] with which the
microcode can be manipulated, and the key has been leaked [2] (or rather
it was public anyway, but was now identified as the key being re-used 
here).

I think a bump to grave is warranted, but it should be serious at least.

I have Zen 2, 3, 5 consumer CPUs at home, if I can help with testing.

Best,
Christian

> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2024-56161
>     https://www.cve.org/CVERecord?id=CVE-2024-56161


[1]: 
https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/README.md
[2]: https://www.openwall.com/lists/oss-security/2025/03/06/2

Reply via email to