If you have kernel access you can already do almost everything so a vulnerability on top of that isn’t that bad since no one should have kernel access to your computer
Comment on ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
avidamoeba@lemmy.ca 3 months ago
Requires kernel-level access. Also AMD is “releasing mitigations”, so is it “unfixable?”
Bjornir@programming.dev 3 months ago
randompasta@lemmy.today 3 months ago
You mean like Crowdstrike?
HauntedCupcake@lemmy.world 3 months ago
MostAll antivirus software runs at kernel levelBjornir@programming.dev 3 months ago
Which is precisely the reason you shouldn’t use an AV apart from the one packaged with Windows
rob_t_firefly@lemmy.world 3 months ago
“They’re going for the kernel!”
"Colonel who?"
RacerX@lemm.ee 3 months ago
Cancer. Brain. Brain cancer.
someguy3@lemmy.world 3 months ago
Requires kernel-level access
What does that mean to the rest of us?
floofloof@lemmy.ca 3 months ago
It means that a malicious actor would already need to have hacked your computer quite deeply through some other vulnerability (or social engineering) before they could take advantage of this one. But I don’t agree with another commenter here that this is a “nothingburger”: this vulnerability enables such a hacker to leave undetectable malware that you just can’t remove from the computer even if you replace everything but the motherboard. That’s significant, particularly for anyone who might be a target of cyber-espionage.
avidamoeba@lemmy.ca 3 months ago
Festivus
Drathro@dormi.zone 3 months ago
I think they meant it as “once infected may be impossible to disinfect.” But it sure doesn’t read that way at first glance.
WHYAREWEALLCAPS@fedia.io 3 months ago
Did they change it? Because now it says "Allows Deep, Virtually Unfixable Infections" and that seems to say exactly what you are.
psud@lemmy.world 3 months ago
Surely one could use the same exploit to restore the original boot code as the malware used to corrupt it