Announcement

Collapse
No announcement yet.

Intel Posts Updated CPU Microcode For Two More SGX Vulnerabilities, Privilege Escalation Bug

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Intel Posts Updated CPU Microcode For Two More SGX Vulnerabilities, Privilege Escalation Bug

    Phoronix: Intel Posts Updated CPU Microcode For Two More SGX Vulnerabilities, Privilege Escalation Bug

    Patch Tuesday brought AMD disclosing a Ryzen Master security issue on Windows and the Cross-Thread Return Address Predictions bug requiring new handling by Linux's KVM. Over on the Intel side they have disclosed nearly three dozen new issues and as a result also published new Linux CPU microcode files for their recent processors to address the disclosures...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    if u has gemini lake or appollo lake === 1 , then you can has the key to decrypt the microcode:

    .....
    But Intel encrypts their microcode. Of course, what can be encrypted can also be decrypted.
    Using vulnerabilities, you can activate an undocumented debugging mode called red unlock. This allows a microcode dump and the decryption keys are inside. The team did a paper for OffensiveCon22 on this technique and you can see a video about it, below.
    So far, the keys for Gemini Lake and Apollo Lake processors are available. That covers quite a number of processors. Of course, there are many more processors out there if you want to try
    .....from https://hackaday.com/2022/07/19/down...e-rabbit-hole/

    Comment

    Working...
    X