CPU security leak Sinkclose: Firmware update also for AMD's Ryzen 3000
The CPU security vulnerability "Sinkclose" allows attackers to inject malicious code. No updates were initially planned for older CPUs.
A security vulnerability in AMD processors allows attackers to bypass security mechanisms in System Monitor Mode (SMM) and execute malicious code. AMD originally planned not to release updates for all affected processors. Now the processor manufacturer is backtracking.
The vulnerability presented at the Defcon 2024 IT security fair in Las Vegas affects hundreds of millions of AMD CPUs from the past ten years, right up to the Ryzen 7000 processors. The discoverers have christened it "Sinkclose" - security vulnerabilities need catchy names these days.
AMD reacted placatingly to the publication, explaining that "it is very difficult to exploit this vulnerability. Attackers must have access to the affected PCs or servers to manipulate the hardware and gain kernel access. AMD compares the Sinkclose technique to a method of accessing the safe deposit boxes of a secured bank." AMD's security announcement on the vulnerability with the CVE number CVE-2023-31315 (CVSS 7.5, risk"high") has already identified many processors for which AMD has scheduled or even released microcode updates.
No updates planned for AMD Ryzen 3000
According to the list from last week, processors from the Ryzen 3000 lines, for example, were not to receive any updates. However, AMD has since updated the security notice.
In addition to older AMD EPYC processors, the processor lists in the announcement now also include microcode updates for AMD's Ryzen 3000 desktop CPUs, Mobile Athlon 3000 and Mobile Ryzen 3000, which are already available according to the date. Owners of AMD's embedded CPUs will have to wait until October. In any case, owners of systems with AMD CPUs have to wait for BIOS updates from the manufacturer - they have to integrate the microcode updates into them.
(dmk)