Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

  • @narc0tic_bird@lemm.ee
    link
    fedilink
    English
    13610 months ago

    That’s so stupid, also because they have fixes for Zen and Zen 2 based Epyc CPUs available.

    Intel vs. AMD isn’t “bad guys” vs. “good guys”. Either company will take every opportunity to screw their customers over. Sure, “don’t buy Intel” holds true for 13th and 14th gen Core CPUs specifically, but other than that it’s more of a pick your poison.

    • @Decipher0771@lemmy.ca
      link
      fedilink
      English
      010 months ago

      “Both sides”

      “Vote third party!”

      Wtf seriously this isn’t the same thing remotely but the arguments used are.

    • Victor
      link
      fedilink
      English
      -3610 months ago

      How is AMD “screwing us over”? Surely they aren’t doing this on purpose? That seems very cynical.

  • @punkfungus@sh.itjust.works
    link
    fedilink
    English
    8910 months ago

    Really not good enough from AMD. I wonder if Intel wasn’t a complete dumpster fire right now if they would still cut off the fix at Zen 3 (I doubt it). There’s really no reason not to issue a fix for these other than they don’t want to pay the engineers for the time to do it, and they think it won’t cost them any reputational damage.

    I hate that every product and company sucks so hard these days.

    • @kibiz0r@midwest.social
      link
      fedilink
      English
      510 months ago

      They did issue a fix: “Buy a new CPU please!”

      That’s why they don’t mind the reputation hit. If 1 person swears allegiance to Intel as a result but 2 people buy new AMD chips, they’re still ahead. And people will forget eventually. But AMD won’t forget the Q3 2024 sales figures.

  • @teawrecks@sopuli.xyz
    link
    fedilink
    English
    5510 months ago

    I feel like this is the perfect place for Right to Repair legislation: the product is broken? And it’s outside your support window? Then give customers what they need to make the fix themselves. It’s not good enough to say “meh, guess you gotta buy one of our newer chips then 🤷”

    • Possibly linux
      link
      fedilink
      English
      1010 months ago

      Especially since the Linux community are the types to go way overkill

      • @Vilian@lemmy.ca
        link
        fedilink
        English
        710 months ago

        Yep, every intel or AMD CPU vulnerability get patched in the kernel before the official firmware patches

    • @nlgranger@lemmy.world
      link
      fedilink
      English
      1010 months ago

      Consumer usage is not really concerned by the attack scenario of this vulnerability from what I understand. The prerequisite is to have access to the bios so it’s already game over at this point.

      • @PM_Your_Nudes_Please@lemmy.world
        link
        fedilink
        English
        510 months ago

        Sure, but that feels a little bit like saying “We don’t need guards inside the prison, because we already have them patrolling around the perimeter.”

      • @WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        310 months ago

        Chip makes should not only treat customer CPUs as possibly-business hardware when adding shit like (Intel) ME, Pluton and (AMD) PSP, but also when patching serious vulnerabilities and providing support!

        • @hangonasecond@lemmy.world
          link
          fedilink
          English
          310 months ago

          When you pay for enterprise equipment, you are typically paying a premium for longer, more robust support. Consumer products are less expensive because they don’t get this support.

          • @WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            010 months ago

            But they are already pretending for whatever reason that these are suitable for enterprises, by always includingthe aformentioned remote control components!

        • @nlgranger@lemmy.world
          link
          fedilink
          English
          110 months ago

          Agreed, firmware security by chip manufacturers has been underwhelming to say the least and we can blame them for that. But in this specific instance I still don’t see the benefit of a fix for consumer usage. Companies have a responsibility and accountability toward their users, so a fix is due, for personal laptops/PCs the threat is toward the owners themselves (activists, diplomats, journalists, etc.). The latter do not buy second hand equipment, and if the firmware is compromised while they own it, they are already in danger.

          • @WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            1
            edit-2
            10 months ago

            The latter do not buy second hand equipment

            You are assuming activists are well funded in some way, and that they are not repressed.

            This obviously has a benefit for consumer usage too, same as encryption. You’re basically saying consumers don’t need any kind of antivirus either, because it’s not that critical.
            This vuln should have been fixed for consumer hardware too, because it basically permanently taints all hardware that is vulnerable to it. And what makes it so hard to release patches for consumer hardware, when patches were already made for the same generations of enterprise hardware? Basically the majority of the work has been done already

            • @nlgranger@lemmy.world
              link
              fedilink
              English
              110 months ago

              I’m not saying this is a small issue and nothing should be done. I just noted that the issue is not as big as some other hardware-based vulnerabilities we encountered in the past. And every threat model calls for a corresponding counter-measure.

              You are assuming activists are well funded in some way, and that they are not repressed. I’m assuming they are repressed, which is why they have people that buy and configure their equipment and hand it to them so that it hasn’t been tampered with. If you cannot afford that your should use your computer as if it was compromised.

              You’re basically saying consumers don’t need any kind of antivirus either Where did I write that?

              And what makes it so hard to release patches for consumer hardware. AMD focusing on where its money’s at and OEM/motherboard manufacturers being cheap and lazy and not pushing forward updates when they have them.

    • @PriorityMotif@lemmy.world
      link
      fedilink
      English
      410 months ago

      Any news on the “pro” line? They were installed on business PCs and had additional security features built in. For instance there is a 3600 pro model.

  • BrightCandle
    link
    fedilink
    English
    2210 months ago

    AMD has unfortunately a long history of abandoning products before its reasonable on its graphics division. Its not really acceptable, up until earlier this year my NAS/server was running a 3600 and its only for power saving purposes I changed that as its still a very workable CPU in that role.

    • @kalpol@lemmy.world
      link
      fedilink
      English
      1110 months ago

      Er I’m still running a FX-8350 as a gaming machine (not AAA games obviously). I had another one as a host for a few VMs and it was more than enough till the motherboard went. One day I’ll upgrade I guess.

  • Harvey656
    link
    fedilink
    English
    1810 months ago

    So I have a 3700x, I’ve read about the vulnerability but don’t fully understand it. How at risk am I?

    • @ozymandias117@lemmy.world
      link
      fedilink
      English
      26
      edit-2
      10 months ago

      If an attacker gets access to your system, they will be able to ensure you can’t get rid of their access

      It will persist across operating system installs

      However, this requires them to get access first

      • Harvey656
        link
        fedilink
        English
        610 months ago

        Sounds like it’s time for an upgrade. Never know what kind of weirdos are out there. Thanks for the information.

    • @psmgx@lemmy.world
      link
      fedilink
      English
      2310 months ago

      If they get root or admin they can hack the chip itself.

      But minor exploits, nada, no issue, you good. Gotta get root to make it happen.

      Problem is if you, as they say, get got, you have no way of knowing if they’re in your CPU, and no way to fix if they did – basically gotta trash it and replace.

  • @Jumuta@sh.itjust.works
    link
    fedilink
    English
    1810 months ago

    so that means you can internally flash the bios chip from the os?

    would be cool if there were coreboot builds for these platforms, this exploit seems pretty useful

  • @ipkpjersi@lemmy.ml
    link
    fedilink
    English
    18
    edit-2
    10 months ago

    Yay, another BIOS update!

    I am getting so sick of all these BIOS updates because of all these security vulnerabilities all the time. It is so tiring having to set up my settings all over again all of the time. Earlier this year, or maybe it was last year, it felt like every month or two there was a new BIOS update for a new security vulnerability.

      • @ipkpjersi@lemmy.ml
        link
        fedilink
        English
        8
        edit-2
        10 months ago

        Depending on your BIOS and/or motherboard, you can’t restore them between versions. The point of clearing the BIOS settings after flashing a new version is to ensure that you only have values that are expected, which is why restoring backups can often be blocked between versions.

  • bruhduh
    link
    fedilink
    English
    910 months ago

    Basically, reflash spi chips and it’ll be gone, and to be infected by that, person gotta have physical access to hardware he hacks, and physical access is root access as always has been

    • TheHolm
      cake
      OP
      link
      fedilink
      English
      110 months ago

      Nope. You do not need physical access for it, just root access. and you HW is compromised with only means to recover it is SPI flashing of CPU.