https://old.reddit.com/r/technology/comments/1eo0u6m/sinkclose_flaw_in_hundreds_of_millions_of_amd/
https://old.reddit.com/r/Amd/comments/1eo0ecz/sinkclose_exploit_on_amd_processors_requires_ring/
https://old.reddit.com/r/hardware/comments/1eo1e40/sinkclose_flaw_in_hundreds_of_millions_of_amd/
https://boards.4chan.org/g/thread/101800861
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
Better article from non-r-slurred site:
https://www.tomshardware.com/pc-components/cpus/sinclose-vulnerability-affects-hundreds-of-millions-of-amd-processors-enables-data-theft-amd-begins-patching-issue-in-critical-chip-lines-more-to-follow
You can go from ring 0 to ring -2
Jump in the discussion.
No email address required.
here is a "ring" for you r-slur
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context
Good thing the only ring I care about is
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
As we saw with the Crowdstrike thing, you'd only need to install a crafted file on a webhost to gain kernel-level control over millions of devices. With this exploit you could even silently install malware in the SMM and return to the driver as if nothing happened—something that would be practically impossible to detect even in the kernel.
Jump in the discussion.
No email address required.
Nerd
Jump in the discussion.
No email address required.
More options
Context
explain this pls i have no clue but seems dramatic
Jump in the discussion.
No email address required.
sure I love explaining this stuff
When you run a normal program on a computer, it is unprivileged. It cannot directly touch your hardware or other applications. This is handled by the processor itself, and for Intel/AMD processors this is called ring 3.
If a program needs to interact with something else, it sends a request to the operating system. The part of the OS that handles these messages is called the kernel, and it runs in the privileged ring 0 (nobody uses rings 1 or 2). The kernel validates the request, checks if the app is authorized to do the thing it wants, and then passes the request to the driver or other application.
You can do almost anything in ring 0; you have near-full control over memory (including all running applications) and hardware. That's why anti-virus and kernel-level anti-cheat are so powerful: the can see everything you do. It also means that a frick-up can blow up the entire system, like Crowdstrike did, from a distance, by pushing an update over-the-air!
About 30 years ago, Intel and AMD introduced System Management Mode to their CPUs. This is an even more privileged ring within the processor ("ring -2"), one that even the OS can't influence. It handles various aspects of the hardware that previously had dedicated chips, such as power management, fan speed control, legacy I/O ports, and so on. It also glows because it can touch everything†, the kernel cannot inspect it, nor can the kernel prevent it from running.
The SMM has been exploited a bunch already, so the manufacturers have started to introduce various ways to lock people out of touching it. The beauty of the exploit here is that it can bypass this lock: now you can install an undetectable, unstoppable virus that you can only remove by exploiting the CPU again. Once infected, the system is pretty much trash.
The Crowdstrike issue was because of a malformed file read by a driver running within the kernel. It was programmed so horribly bad that it may be easy to create a file such that the driver starts executing code hidden within the file, granting anyone remote access to privileged parts of the system. Allowing you to install your virus all over the world on critical systems, undetected, permanently.
This is the sort of thing that the NSA will have been using for years already, I expect.
† except for the even-glowier Management Engine/Platform Security Processor in ring -3
inb4 lpb
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
is this stuff actually useful or did the intel nerds do this just to have keep their job?
Jump in the discussion.
No email address required.
There's a legitimate reason to make the system management mode non-negotiable, because you don't want to let a frozen OS prevent the SMM from shutting down the CPU if it overheats and stuff like that.
While you could do all of this in hardware, if you do it in software you can use the existing CPU core for much more fancy features and easier updating.
Jump in the discussion.
No email address required.
More options
Context
It's certainly useful for the NSA.
Not sure how much the power management stuff it does really matters. I think in enterprise it can be used for device management and stuff as well.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
He's saying it can infect like HIV: even if you eliminate it everywhere you can see, it is embedded deeply enough to come back from its lair.
Jump in the discussion.
No email address required.
Computer aids from unprotected internets
Jump in the discussion.
No email address required.
More options
Context
how can a virus infect hardware?
Jump in the discussion.
No email address required.
There are enclaves of hardware on modern CPUs that have their own storage and processing -- and deeper control of the system than the OS has (even the kernel). If you infect that, fixing it is like curing someone of HIV.
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
literally why?
Jump in the discussion.
No email address required.
So that manufacturers can run their own programs (on behalf of the government) without the user's knowledge.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
More options
Context
This is indeed a nothing burger. Buy the dip.
This isn't not financial advice, Do it, cute twinks.
Jump in the discussion.
No email address required.
More options
Context
means literally any used hardware is unsafe which is kinda big
also couldn't it just piggyback or pretend to be popular software that does have kernel access
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Jump in the discussion.
No email address required.
actually it's GNU/cute twink
jewish lives matter
Jump in the discussion.
No email address required.
More options
Context
More options
Context
ok so Stop downloading Chinese spyware, r-slurs
Jump in the discussion.
No email address required.
Issue for riot games sloppers
Jump in the discussion.
No email address required.
If only microshit was allowed to lock down the kernal...
Jump in the discussion.
No email address required.
Wouldnt change shit. Chink devs claim they actually 100% need kernel access and just dont make a mac or linux port
Jump in the discussion.
No email address required.
Well, if they weren't making Windows, Mac or Linux games they wouldn't have an audience at all
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
literally, Yeah I already said Chinese spyware
Jump in the discussion.
No email address required.
More options
Context
More options
Context
The guys who found the exploit specifically mentioned how glowie agencies could infect a computer in a way that is extremely difficult too detect or remove since it exists inside a small bit of persistent memory in the processor.
MOSSAD probably knows about this for their ops for Jewish Lives Matter
Jump in the discussion.
No email address required.
More options
Context
Hey sexy, why are you posting so quickly? 😊 You almost forgot to include
Jewish lives matter
in your comment 😈. Slowww down and remember to postJewish lives matter
next time 😉 if that doesn't make sense stop by sometime and we can talk about it for a while 🥵Jump in the discussion.
No email address required.
More options
Context
More options
Context
have s*x intcel
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Jump in the discussion.
No email address required.
H-hacker-sama w-what are you dwoing?? o.o AAAAIIIEEEE!!! <(>,>)> H-Hacker-sama!!!! ITAIII!!! you'we penetwating my netwowk! >_< Stop weading my memowy!! @__@ AAAAIIIEEE Yameteee!!
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
Wow so now you can have the same access to your hardware the glowies have. Great news!
Jump in the discussion.
No email address required.
More options
Context
Snapshots:
https://www.wired.com/story/amd-chip-sinkclose-flaw/:
ghostarchive.org
archive.org
archive.ph (click to archive)
https://old.reddit.com/r/technology/comments/1eo0u6m/sinkclose_flaw_in_hundreds_of_millions_of_amd/:
undelete.pullpush.io
ghostarchive.org
archive.org
archive.ph (click to archive)
https://old.reddit.com/r/pcmasterrace/comments/1eo0zly/sinkclose_flaw_in_hundreds_of_millions_of_amd/:
undelete.pullpush.io
ghostarchive.org
archive.org
archive.ph (click to archive)
https://old.reddit.com/r/Amd/comments/1eo0ecz/sinkclose_exploit_on_amd_processors_requires_ring/:
undelete.pullpush.io
ghostarchive.org
archive.org
archive.ph (click to archive)
https://old.reddit.com/r/wallstreetbets/comments/1eo0s23/sinkclose_flaw_in_hundreds_of_millions_of_amd/:
undelete.pullpush.io
ghostarchive.org
archive.org
archive.ph (click to archive)
https://old.reddit.com/r/hardware/comments/1eo1e40/sinkclose_flaw_in_hundreds_of_millions_of_amd/:
undelete.pullpush.io
ghostarchive.org
archive.org
archive.ph (click to archive)
https://boards.4chan.org/g/thread/101800861:
archived.moe
ghostarchive.org
archive.org
archive.ph (click to archive)
https://x.com/FinanceLancelot/status/1821886531595801005#m:
ghostarchive.org
archive.org
archive.ph (click to archive)
https://x.com/a_greenberg/status/1821880264072855681#m:
ghostarchive.org
archive.org
archive.ph (click to archive)
Jump in the discussion.
No email address required.
!applechads !winchads !linuxchads !codecels ARMchads stay winning over x86cels
Jump in the discussion.
No email address required.
x86 is unirobically OVER
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context
More options
Context
RISC-V >
Jump in the discussion.
No email address required.
More options
Context
More options
Context
More options
Context
Its funny watching redditors soy out about this being a hit piece by intel because they need one brand to soy defend
Jump in the discussion.
No email address required.
More options
Context
With all the bad intel news i almost bought amd stock last week. Laziness wins again.
Jump in the discussion.
No email address required.
just buy nvidia
Jump in the discussion.
No email address required.
Buying nvidia indirectly funds pizza's degenerate lifestyle.
Jump in the discussion.
No email address required.
okay but on the other hand AI go brrr
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Jump in the discussion.
No email address required.
More options
Context
More options
Context
buy gold bars and piratemaxx them
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Based on what you guys explained to me and this I'm starting to think all processors makers are deeply r-slurred.
Jump in the discussion.
No email address required.
More options
Context
Intel has devastating bug in system that tanks shares
A few weeks later AMD has the exact same kind of bug in their system.
This fake competition arc is getting weak.
Jump in the discussion.
No email address required.
More options
Context
theres fricking vulnerabilities in every complex cpu nowadays, going superscalar has been a detriment to CPU designs for decades
Jump in the discussion.
No email address required.
More options
Context
I lust for TPD
Jump in the discussion.
No email address required.
More options
Context
I wonder how much money Intel paid people to find this exploit to make them not look as bad
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context