• PeachMan@lemmy.one
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Well, this happens to affect the Ryzen 5 3600, which I’m pretty sure is one of AMD’s most popular processors ever…so you’re certainly not alone.

    • MooseBoys@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      11 months ago

      when the new kernel comes out Linux users will be safe

      It’s going to take a lot longer than that for most distros to move to latest upstream. This specific fix might be pulled in as a hotfix if you’re lucky, but it still takes time. The latest Ubuntu LTS is on 5.15, for example, which was released in October 2021. Debian Bookworm, which just released last month, uses 6.1 from December 2022.

      • I_like_cats@lemmy.one
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        Critical security fixes are backported. There where a lot of kernels released yesterday that had the fix. For 5.15, 5.15.122 was released with the zenbleed mitigation.

      • Gnubyte@lemdit.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        Highly recommend Pop OS! It’s been very reliable. I haven’t had anything this steady since Mac OS when I was just doing programming. I tried to go from Mac to Alienware for personal computing and it was terrible, windows blue screened almost once a week if not once every four days.

        Switched to Pop OS, enabled Proton in steams preferences for gaming, and it was completely steady. Only thing that doesn’t work is the hibernate. Which isn’t a super big deal to me.

        I’d actually say everything has been a better experience than windows. Lutris and pop store have a large variety of games and apps. For example lutris supports GOG and probably epic games. It feels like it’s everything I’d want without the shitty user interfaces and lack of crashes.

        • peopleproblems@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 months ago

          I know it’s not the best, but Proton has come a long, long way. I can play D4, Monster Hunter, factorio, lots of stuff.

          • sep@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            It is really fantastic. With steam almost all the games i bother playing just works. Deleted the windows partition years ago.
            Just have to check the community forum how well it works before buying. Or just get a refund if it does not work.

          • nul9o9@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            I’ve been testing the waters with my steam deck. There are some hiccups, but almost everything I want to play can be done with proton.

          • Cabrio@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            11 months ago

            I know it’s not the best

            Didn’t pay thousands for top of the line ryzen and nvidia gear for “not the best” gaming situation.

            Linux falls short on two major fronts, less idiot proof, less gamer friendly, and that’s Windows’ largest market shares, idiots and gamers.

    • evatronic@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      11 months ago

      It’s worth noting these are the firmware / microcode fixes.

      There’s already a software solution available,

      There is a software workaround, you can set the chicken bit DE_CFG[9]. This may have some performance cost, and the microcode update is preferred.

      source: https://www.openwall.com/lists/oss-security/2023/07/24/3

      AMD has also already released a fix for the big boy - the EPYC processor.

      • Dr. Dabbles@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        The MSR bit is potentially a large performance loss and AMD recommends their partners not use it. In my tests is was 5-15% on EPYC depending on workload. “Some performance cost” is really hiding the reality of that bit.

  • ezchili@iusearchlinux.fyi
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    11 months ago

    The article says it’s exploitable via javascript on a random web page. I don’t see how that could be possible

  • malloc@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Intel had something like this as well (side channel attack?). I remember it because Linus Torvalds (creator of Linux kernel) ripped Intel a new one.

  • NaN@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    affects all Zen 2-based Ryzen, Threadripper, and EPYC CPUs

    I know they’re probably pretty common, all my stuff ended up being Zen 3. Here’s hoping they don’t find similar issues in later generations.

    • r00ty@kbin.life
      link
      fedilink
      arrow-up
      2
      ·
      11 months ago

      The guys themselves made a pretty good write-up. https://lock.cmpxchg8b.com/zenbleed.html

      The short version is that the very large registers on the modern CPUs aren’t fixed things like they used to be, they’re allocated from some register area on the die. When they “zero” the upper portion of one of the large registers it doesn’t really clear it. It just releases the block back to available.

      Another thing all CPUs need these days to keep fast is branch prediction. CPUs are only fast if they can keep the pipeline of upcoming commands (opcodes) to process full. So they often run both possible routes for a branch and discard the loser.

      In this case they “trick” the CPU by asking it to “clear” a block of one of these large registers (the upper half). But then have the branch go the other way. What sometimes happens is that the register space is “released” but it has to take it back. In some specific circumstances they are able to have the register come back, but not with the original contents but with some random contents of maybe another register that was used by another thread (maybe even running on a different VM guest).

      I have a server with a 3000 series CPU. I can confirm this definitely works. You’ll get all kind of random blocks of memory from processes running as all users (and kernel code). For AMD processors running VM servers it is even worse. Because if you have say a VPS running on an AMD Zen2 CPU, you can login as any user run this and get random data from people on other VPS on the same hardware!

      There is a linux workaround, and it seems most CPUs will be fixed by December.

      Note: If you have access to a VPS that is vulnerable, do note that in most countries it is illegal to even try to exploit this.

  • Jane@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    How come branch prediction seems so vulnerable to exploits? Both spectre and meltdown were also caused by branch prediction not working quite right.

    • anlumo@feddit.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      It wasn’t branch prediction alone, it was the cache combined with branch prediction. The problem is that even discarded outcomes fill the cache with data. Those older vulnerabilities also had the problem that the access permissions check was done after the branch prediction. It’s probably too expensive to do when it’s not even clear yet whether the branch is going to be taken (that’s just speculation on my part though).

    • JackbyDev@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      The more steps in the instruction pipeline the more ways there are for there to be an error where some result doesn’t get erased when undoing stuff from the wrong branch. It’s basically like telling someone to move into a new house and get settled then stopping them six hours in and trying to make sure you get all their stuff out.

  • ferret@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 months ago

    Nice to know that security researchers are giving AMD some love too. Ill be sure to turn the patch off on my 3600 once it rolls around (can’t be losing any frames for something silly like security)

    • LoafyLemon@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      11 months ago

      That’s a very bad idea.

      The bad news is that the exploit doesn’t require physical hardware access and can be triggered by loading JavaScript on a malicious website.

  • ScaredDuck@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 months ago

    Is there any information on the performance impact of the microcode fix or is it too early for that?

    • Dr. Dabbles@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      11 months ago

      So far the word is the microcode fix causes negligible performance impact, but using the MSR fix causes 5-15% loss. In my own testing on EPYC hardware, microcode made no noticable difference to my workloads and benchmarks. Same as random noise in results.

  • Ocelot@lemmies.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 months ago

    This is pretty bad but it needs local access to a server/workstation as well as pretty sophisticated knowledge/tools to exploit. Even then there’s no guarantee of getting any relevant information out of it. Anything with frequent enough logins/hashes going through the local system is probably a server someplace, and if its important you should have it physically locked away and access controlled.

      • stankmut@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        Is there any evidence that the exploit works in a browser? A few comments on the article suggested that the Javascript engines in browsers protect against timing attacks like these.