TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf]

195 pointsby ruik9 months ago

7 comments

tux38 months ago
I was confused by the title, by &quot;Ring-2&quot; it means &quot;Ring -2&quot; (minus two), which is &quot;traditionally&quot; SMM (System Management Mode), a horrible relic that lets your BIOS&#x2F;UEFI silently steal the CPU from the OS to implement janky drivers or workarounds directly in the firmware (occasionally causing all sorts of mayhem).<p>(Actual Ring 2 is very rarely seen, so perhaps I should have known!)
评论 #41521768 未加载
pella8 months ago
AMD fix status: <a href="https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;resources&#x2F;product-security&#x2F;bulletin&#x2F;amd-sb-7014.html" rel="nofollow">https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;resources&#x2F;product-security&#x2F;bulletin&#x2F;a...</a><p><a href="https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2023-31315" rel="nofollow">https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2023-31315</a>
评论 #41524499 未加载
Taniwha8 months ago
The paper asks &quot;why does this feature exist?&quot; - probably they haven&#x27;t gone far enough back in history (note I&#x27;ve worked on x86 clones I understand this stuff in far too great a detail)<p>Originally on x86 systems memory was in VERY short supply - SMM mode memory was the DRAM that the VGA window in low memory (0xa0000) overlaid - normal code couldn&#x27;t access it because the video card claimed memory accesses to that range of addresses - so the north bridge when the CPU was in SMM mode switched data and instruction accesses to that range to go to DRAM rather than the VGA card .... that&#x27;s great except remember that SMM mode was used for special setup stuff for laptops .... sometimes they need to be able to display on the screen .... that&#x27;s what this special mode was originally for: so that SMM mode code can display on the screen (it&#x27;s also likely why SMM mode graphics were so primitive, you&#x27;re switching in and out of this mode for every pixel you write)
jandrese8 months ago
Sometimes it&#x27;s nice to see SMP causing headaches for the &quot;bad&quot; guys for a change. They did eventually work around it, but half of this paper is working around problems where the second core gets out of sync and crashes as soon as they tried to exploit the system.
评论 #41524122 未加载
评论 #41524673 未加载
transpute8 months ago
Android pKVM hypervisor tries to constrain vendor-specific Arm EL3 TrustZone (~x86 SMM Ring-2) on Pixel 7&#x2F;8&#x2F;9, <a href="https:&#x2F;&#x2F;lkml.org&#x2F;lkml&#x2F;2022&#x2F;11&#x2F;16&#x2F;1241" rel="nofollow">https:&#x2F;&#x2F;lkml.org&#x2F;lkml&#x2F;2022&#x2F;11&#x2F;16&#x2F;1241</a><p><pre><code> pKVM&#x27;s primary goal is to protect guest pages from a compromised host by enforcing access control restrictions using stage-2 page-tables. Sadly, this cannot prevent TrustZone from accessing non-secure memory, and a compromised host could, for example, perform a &#x27;confused deputy&#x27; attack by asking TrustZone to use pages that have been donated to protected guests. This would effectively allow the host to have TrustZone exfiltrate guest secrets on its behalf, hence breaking the isolation that pKVM intends to provide.. FF-A provides (among other things) a set of memory management APIs allowing the Normal World to share, donate or lend pages with Secure. By monitoring these SMCs, pKVM can ensure that the pages that are shared, lent or donated to Secure by the host kernel are only pages that it owns.. the robustness of this approach relies on having all Secure Software on the device use the FF-A protocol for memory management transactions with the normal world, and not use vendor-specific SMCs that pKVM is unable to parse. </code></pre> On x86, SMM attestation was introduced by Intel (PPAM &#x2F; Hardware Shield, 11+ gen) and AMD, <a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;blog&#x2F;2020&#x2F;11&#x2F;12&#x2F;system-management-mode-deep-dive-how-smm-isolation-hardens-the-platform&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;blog&#x2F;2020&#x2F;11&#x2F;12&#x2F;sys...</a><p><i>&gt; Because of its traditionally unfettered access to memory and device resources, SMM is a known vector of attack for gaining access to the OS and hardware.. One could have perfect code in SMM and still be affected by behavior like trampolining into secure kernel code.. Isolating SMM is implemented in three parts: OEMs implement a policy that states what they require access to; the chip vendor enforces this policy on SMIs; and the chip vendor reports compliance to this policy to the OS.</i>
HowardStark8 months ago
Is the recorded session available anywhere? Generally prefer the slides with the presenter walking us through them.
评论 #41524426 未加载
评论 #41519820 未加载
评论 #41526985 未加载
paulmd8 months ago
it&#x27;s funny that they have to debunk the &quot;root is root, why would AMD patch this&quot; that goes around every time there&#x27;s a serious issue that allows guest-root escape from virtualized containers.<p>the same thing happened with the ryzenfall&#x2F;masterkey exploit, where people were just in utter denial there was an actual exploit there, because root is root! People literally spent more time talking about who released it and their background image than the actual exploit. AMD obvious cannot have exploits, that&#x27;s only an intel thing. &#x2F;s<p><i>&quot;alleged&quot; flaws&quot; (rolls eyes) <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;845w8e&#x2F;alleged_amd_zen_security_flaws_megathread&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;845w8e&#x2F;alleged_amd_zen...</a><p></i>assassination attempt* <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;849paz&#x2F;assassination_attempt_on_amd_by_viceroy_research&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;849paz&#x2F;assassinat...</a><p>doxxing the researchers: <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;845xks&#x2F;some_background_information_on_the_new_amd&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;845xks&#x2F;some_backg...</a><p><a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;84tftt&#x2F;clarification_about_the_recent_vulnerabilities&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;84tftt&#x2F;clarification_a...</a><p><a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;8589t2&#x2F;cts_labs_clarifications_on_ryzenfall_masterkey&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;8589t2&#x2F;cts_labs_clarif...</a><p>HN discussions were not much better, although tpacek is cool.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576342">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576342</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576516">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576516</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16597626">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16597626</a>
评论 #41527144 未加载