If you have kernel access you can already do almost everything so a vulnerability on top of that isn’t that bad since no one should have kernel access to your computer
Comment on ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
avidamoeba@lemmy.ca 1 month ago
Requires kernel-level access. Also AMD is “releasing mitigations”, so is it “unfixable?”
Bjornir@programming.dev 1 month ago
randompasta@lemmy.today 1 month ago
You mean like Crowdstrike?
HauntedCupcake@lemmy.world 1 month ago
MostAll antivirus software runs at kernel levelBjornir@programming.dev 1 month ago
Which is precisely the reason you shouldn’t use an AV apart from the one packaged with Windows
rob_t_firefly@lemmy.world 1 month ago
“They’re going for the kernel!”
"Colonel who?"
RacerX@lemm.ee 1 month ago
Cancer. Brain. Brain cancer.
someguy3@lemmy.world 1 month ago
Requires kernel-level access
What does that mean to the rest of us?
floofloof@lemmy.ca 1 month ago
It means that a malicious actor would already need to have hacked your computer quite deeply through some other vulnerability (or social engineering) before they could take advantage of this one. But I don’t agree with another commenter here that this is a “nothingburger”: this vulnerability enables such a hacker to leave undetectable malware that you just can’t remove from the computer even if you replace everything but the motherboard. That’s significant, particularly for anyone who might be a target of cyber-espionage.
avidamoeba@lemmy.ca 1 month ago
Festivus
Drathro@dormi.zone 1 month ago
I think they meant it as “once infected may be impossible to disinfect.” But it sure doesn’t read that way at first glance.
WHYAREWEALLCAPS@fedia.io 1 month ago
Did they change it? Because now it says "Allows Deep, Virtually Unfixable Infections" and that seems to say exactly what you are.
psud@lemmy.world 1 month ago
Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it