TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Update your AMD hosts now to mitigate the Zenbleed exploit

3 点作者 alexellisuk将近 2 年前

2 条评论

0x_rs将近 2 年前
If you&#x27;re on Windows, the following script should set the necessary MSR without entirely disabling AVX. There&#x27;s not really any other way to do it other than with WinRing0&#x27;s driver, doing it via WinDbg is not practical at all even if you manage to run local debug. And what the DE_CFG[9] bit exactly does other than &quot;preventing complex side effects instructions&quot; I&#x27;m not sure, there&#x27;s barely any information online, and most OS vendors are silent on this.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;sbaresearch&#x2F;stop-zenbleed-win">https:&#x2F;&#x2F;github.com&#x2F;sbaresearch&#x2F;stop-zenbleed-win</a>
评论 #36942965 未加载
alexellisuk将近 2 年前
The Zenbleed exploit was announced about a week ago, however the Register wrongly and dangerously claims that it doesn&#x27;t affect QEMU or &quot;any form of emulation&quot;.<p>We were able to run the exploit inside of a Firecracker VM with KVM, and of course Docker, K8s etc has the same set of issues.<p>Short story - if you&#x27;re running an AMD CPU, check the exploit (it&#x27;s very quick) and update your OS.