Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <eb6ac191-18a8-45a2-99bf-2bee42b02fca@ehuk.net>
Date: Thu, 30 Oct 2025 16:25:29 +0000
From: Eddie Chapman <eddie@...k.net>
To: oss-security@...ts.openwall.com
Subject: Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU
 Microcode Signature Verification Vulnerability

On 08/04/2025 17:39, Andrew Cooper wrote:
> On 13/03/2025 3:55 am, Solar Designer wrote:
>> On Sat, Mar 08, 2025 at 01:28:07AM +0000, Andrew Cooper wrote:
>>> On 06/03/2025 4:48 am, Solar Designer wrote:
>>>> On Thu, Mar 06, 2025 at 04:11:25AM +0000, Andrew Cooper wrote:
>>>>> This issue wins points for spite, because the highest risk users are the
>>>>> ones who were taking proactive steps to try and improve their security,
>>>>> betting that AMD's patchloader crypto was sound.
>>>> OK, so this is to protect legitimate sysadmins from loading malicious
>>>> microcode inadvertently or via a supply chain attack.  Makes sense.
>>> Sorry for the delay, I knew there was a distro formally doing this, but
>>> I'd lost track of the links.
>>>
>>> https://github.com/divestedcg/real-ucode which is packaged for Arch as
>>> https://aur.archlinux.org/packages/amd-real-ucode-git (and an equivalent
>>> Intel package).
>> Thank you for these followup postings, Andrew!  They're very helpful.

<snip>

Please bear with me as this is coming from someone whose main area of 
work is NOT security. But one of my hats is looking after a good few AMD 
Zen systems.

When I skimmed this thread back in April the implications for sysadmins 
of the changes made by AMD to microcode loading didn't fully hit home. 
However, with AMD's comment added to amd-ucode/README in their commit 
[1] to the linux firmware repository this week it finally dawned on me 
that huge numbers of AMD machines are never going to get future 
microcode updates, unless their owners update the BIOS.

Even just for 1 AMD machine, a BIOS updates is harder than it should be, 
since almost none of the major motherboard manufacturers have managed to 
implement the ability to somehow save a set of BIOS settings that can 
then be reloaded after updating (or at least one that works reliably). 
Meaning each machine's BIOS needs to be completely reconfigured each 
time, very time consuming and problematic for some deployments.

So I find it very interesting to see the efforts of some projects (URLs 
of some in this thread) to solve this very real problem by making it 
possible to update microcode despite older BIOS, made possible going 
forward by microcode.amd_sha_check=off [2] kernel command line option.

I feel like this thread deserved a little more discussion about these 
efforts themselves. The issue was only skimmed over in April.

My own take: yes, such efforts are ugly and will never be the preferred 
"ideal world" recommendation, and come with significant risks which have 
been hinted at already. The op is clearly of the opinion that you are 
shooting yourself in the foot, which may be right.

However I think it's not so black and white, as time goes by without a 
BIOS update the risks of *not* updating just the microcode become 
greater and greater. Do those risks eventually outweigh the risk of 
breaking out of the "official" approach dictated by vendors? It comes 
more sharply into focus for some boards which may never receive a BIOS 
update (although my impression they are in the minority). I guess we are 
just seeing the ugly security situation in the smartphone world starting 
to rear it's head a little bit in the x86-64 world.

Eddie

[1] 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=ad91544767665e911386e62ecebaa969e2cfb1c0
[2] See commit 50cef76d5cb0e199cda19f026842560f6eedc4f7 in the upstream 
Linux kernel

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.