TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf]

195 点作者 ruik9 个月前

7 条评论

tux38 个月前
I was confused by the title, by &quot;Ring-2&quot; it means &quot;Ring -2&quot; (minus two), which is &quot;traditionally&quot; SMM (System Management Mode), a horrible relic that lets your BIOS&#x2F;UEFI silently steal the CPU from the OS to implement janky drivers or workarounds directly in the firmware (occasionally causing all sorts of mayhem).<p>(Actual Ring 2 is very rarely seen, so perhaps I should have known!)
评论 #41521768 未加载
pella8 个月前
AMD fix status: <a href="https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;resources&#x2F;product-security&#x2F;bulletin&#x2F;amd-sb-7014.html" rel="nofollow">https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;resources&#x2F;product-security&#x2F;bulletin&#x2F;a...</a><p><a href="https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2023-31315" rel="nofollow">https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2023-31315</a>
评论 #41524499 未加载
Taniwha8 个月前
The paper asks &quot;why does this feature exist?&quot; - probably they haven&#x27;t gone far enough back in history (note I&#x27;ve worked on x86 clones I understand this stuff in far too great a detail)<p>Originally on x86 systems memory was in VERY short supply - SMM mode memory was the DRAM that the VGA window in low memory (0xa0000) overlaid - normal code couldn&#x27;t access it because the video card claimed memory accesses to that range of addresses - so the north bridge when the CPU was in SMM mode switched data and instruction accesses to that range to go to DRAM rather than the VGA card .... that&#x27;s great except remember that SMM mode was used for special setup stuff for laptops .... sometimes they need to be able to display on the screen .... that&#x27;s what this special mode was originally for: so that SMM mode code can display on the screen (it&#x27;s also likely why SMM mode graphics were so primitive, you&#x27;re switching in and out of this mode for every pixel you write)
jandrese8 个月前
Sometimes it&#x27;s nice to see SMP causing headaches for the &quot;bad&quot; guys for a change. They did eventually work around it, but half of this paper is working around problems where the second core gets out of sync and crashes as soon as they tried to exploit the system.
评论 #41524122 未加载
评论 #41524673 未加载
transpute8 个月前
Android pKVM hypervisor tries to constrain vendor-specific Arm EL3 TrustZone (~x86 SMM Ring-2) on Pixel 7&#x2F;8&#x2F;9, <a href="https:&#x2F;&#x2F;lkml.org&#x2F;lkml&#x2F;2022&#x2F;11&#x2F;16&#x2F;1241" rel="nofollow">https:&#x2F;&#x2F;lkml.org&#x2F;lkml&#x2F;2022&#x2F;11&#x2F;16&#x2F;1241</a><p><pre><code> pKVM&#x27;s primary goal is to protect guest pages from a compromised host by enforcing access control restrictions using stage-2 page-tables. Sadly, this cannot prevent TrustZone from accessing non-secure memory, and a compromised host could, for example, perform a &#x27;confused deputy&#x27; attack by asking TrustZone to use pages that have been donated to protected guests. This would effectively allow the host to have TrustZone exfiltrate guest secrets on its behalf, hence breaking the isolation that pKVM intends to provide.. FF-A provides (among other things) a set of memory management APIs allowing the Normal World to share, donate or lend pages with Secure. By monitoring these SMCs, pKVM can ensure that the pages that are shared, lent or donated to Secure by the host kernel are only pages that it owns.. the robustness of this approach relies on having all Secure Software on the device use the FF-A protocol for memory management transactions with the normal world, and not use vendor-specific SMCs that pKVM is unable to parse. </code></pre> On x86, SMM attestation was introduced by Intel (PPAM &#x2F; Hardware Shield, 11+ gen) and AMD, <a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;blog&#x2F;2020&#x2F;11&#x2F;12&#x2F;system-management-mode-deep-dive-how-smm-isolation-hardens-the-platform&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;security&#x2F;blog&#x2F;2020&#x2F;11&#x2F;12&#x2F;sys...</a><p><i>&gt; Because of its traditionally unfettered access to memory and device resources, SMM is a known vector of attack for gaining access to the OS and hardware.. One could have perfect code in SMM and still be affected by behavior like trampolining into secure kernel code.. Isolating SMM is implemented in three parts: OEMs implement a policy that states what they require access to; the chip vendor enforces this policy on SMIs; and the chip vendor reports compliance to this policy to the OS.</i>
HowardStark8 个月前
Is the recorded session available anywhere? Generally prefer the slides with the presenter walking us through them.
评论 #41524426 未加载
评论 #41519820 未加载
评论 #41526985 未加载
paulmd8 个月前
it&#x27;s funny that they have to debunk the &quot;root is root, why would AMD patch this&quot; that goes around every time there&#x27;s a serious issue that allows guest-root escape from virtualized containers.<p>the same thing happened with the ryzenfall&#x2F;masterkey exploit, where people were just in utter denial there was an actual exploit there, because root is root! People literally spent more time talking about who released it and their background image than the actual exploit. AMD obvious cannot have exploits, that&#x27;s only an intel thing. &#x2F;s<p><i>&quot;alleged&quot; flaws&quot; (rolls eyes) <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;845w8e&#x2F;alleged_amd_zen_security_flaws_megathread&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;845w8e&#x2F;alleged_amd_zen...</a><p></i>assassination attempt* <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;849paz&#x2F;assassination_attempt_on_amd_by_viceroy_research&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;849paz&#x2F;assassinat...</a><p>doxxing the researchers: <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;845xks&#x2F;some_background_information_on_the_new_amd&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;hardware&#x2F;comments&#x2F;845xks&#x2F;some_backg...</a><p><a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;84tftt&#x2F;clarification_about_the_recent_vulnerabilities&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;84tftt&#x2F;clarification_a...</a><p><a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;8589t2&#x2F;cts_labs_clarifications_on_ryzenfall_masterkey&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;Amd&#x2F;comments&#x2F;8589t2&#x2F;cts_labs_clarif...</a><p>HN discussions were not much better, although tpacek is cool.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576342">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576342</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576516">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16576516</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16597626">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16597626</a>
评论 #41527144 未加载