veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

296
active users

#microcode

0 posts0 participants0 posts today
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>World's first <a href="https://hachyderm.io/tags/CPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPU</span></a>-level <a href="https://hachyderm.io/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> can "bypass every freaking traditional technology we have out there" — new <a href="https://hachyderm.io/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a>-based attacks could usher in new era of unavoidable ransomware<br>Beek, <a href="https://hachyderm.io/tags/Rapid7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rapid7</span></a>'s senior director of threat analytics, revealed AMD Zen chip bug gave him idea that highly skilled attacker could in theory "allow those intruders to load unapproved <a href="https://hachyderm.io/tags/microcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microcode</span></a> into the processors, breaking encryption at the hardware level and modifying CPU behavior at will." <br><a href="https://www.tomshardware.com/pc-components/cpus/worlds-first-cpu-level-ransomware-can-bypass-every-freaking-traditional-technology-we-have-out-there-new-firmware-based-attacks-could-usher-in-new-era-of-unavoidable-ransomware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/pc-components</span><span class="invisible">/cpus/worlds-first-cpu-level-ransomware-can-bypass-every-freaking-traditional-technology-we-have-out-there-new-firmware-based-attacks-could-usher-in-new-era-of-unavoidable-ransomware</span></a></p>
André Machado :debian:<p>Extensive Analysis of the Raptor Lake CPU Bug</p><p>Intel’s Raptor Lake CPUs, which form part of the 13th and 14th generation Intel Core desktop processor line, were celebrated for their hybrid architecture combining high-performance cores with efficiency cores. However, shortly after their release, a critical bug emerged that has led to system instability and, in some cases, permanent degradation of the affected chips.</p><p>Read More: <a href="https://machaddr.substack.com/p/extensive-analysis-of-the-raptor" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">machaddr.substack.com/p/extens</span><span class="invisible">ive-analysis-of-the-raptor</span></a></p><p><a href="https://mastodon.sdf.org/tags/CPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPU</span></a> <a href="https://mastodon.sdf.org/tags/Bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bug</span></a> <a href="https://mastodon.sdf.org/tags/Microcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microcode</span></a> <a href="https://mastodon.sdf.org/tags/Intel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intel</span></a> <a href="https://mastodon.sdf.org/tags/Computer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computer</span></a></p>
Wulfy<p>One of the organisations I work for is so poor, we should not exist by any account.</p><p>How poor?<br>Our main server is fifteen years old.<br>Only reason we got it, it was abandoned in a rack we bought for $50 and I resurrected it.</p><p>This transcends boneyard.<br>This is summoning machine spirits from beyond, Deus Mechanics incantations.</p><p>I yelled at the Operations manager today, calling him a Necromancer because he was praising this ancient "Raid" box as "better than what we used to have" when all I want to do is nail it to the wall as a warning to others.</p><p>Anyhoo...<br>This is how I found today that a 15 year old iron running <a href="https://infosec.exchange/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> 10 simply could not run any <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> images of this particular package because the <a href="https://infosec.exchange/tags/nodej" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nodej</span></a> component just won't run on the <a href="https://infosec.exchange/tags/microcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microcode</span></a> </p><p>I don't even realise it was a thing.<br>But then, how many of you run a box that's 15 years old in production...</p><p>...how "slow" is that rack server?<br>I pulled one of the Intel NUCs out of the boneyard (it's one of those paper book sized box "computers") and put Debian on THAT...</p><p>...it runs 33% faster and that thing was binned because it couldn't pull an office admin desktop workload.</p><p>33% faster!!!</p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>How to make any <a href="https://hachyderm.io/tags/AMD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMD</span></a> Zen <a href="https://hachyderm.io/tags/CPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPU</span></a> always generate 4 from RDRAND<br>"We have demonstrated the ability to craft arbitrary malicious microcode patches on Zen 1 through <a href="https://hachyderm.io/tags/Zen4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zen4</span></a> CPUs," the Google <a href="https://hachyderm.io/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> Team said.<br>"The <a href="https://hachyderm.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> is that the CPU uses an insecure hash function in the signature validation for <a href="https://hachyderm.io/tags/microcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microcode</span></a> updates."<br>The flaw listed as CVE-2024-56161 with a CVSS score of 7.2 out of 10, was discovered and reported to AMD in September, and a fix was devised by December.<br><a href="https://www.theregister.com/2025/02/04/google_amd_microcode/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/02/04/goo</span><span class="invisible">gle_amd_microcode/</span></a></p>