Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Jul 2023 14:46:21 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 272695] sysutils/devcpu-data-amd: A new microcode attack against the AMD Zen uarch has been published
Message-ID:  <bug-272695-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272695

            Bug ID: 272695
           Summary: sysutils/devcpu-data-amd: A new microcode attack
                    against the AMD Zen uarch has been published
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: sbruno@FreeBSD.org
          Reporter: crest@rlwinm.de
          Assignee: sbruno@FreeBSD.org
             Flags: maintainer-feedback?(sbruno@FreeBSD.org)

A new attack on AMD Zen CPUs has just been published at
https://lock.cmpxchg8b.com/zenbleed.html. AMD has released a microcode upda=
ted
closing the exploitable vulnerability, but a workaround via cpuctl is possi=
ble
(probably with a higher performance penalty). Waiting for mainboard vendors=
 to
release firmware updates including the updated microcode and users to insta=
ll
it is unrealistic. This port should be the best delivery mechanism availabl=
e to
FreeBSD users.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-272695-7788>