GET AMD fixes vulnerability in microcode of its microprocessors / ESET NOD32 Blog / Sudo Null IT News FREE
AMD will release a firmware update tomorrow for its Piledriver architecture microprocessors ( AMD Piledriver Family 15h ). The update specializes in eliminating a vulnerability in virtualization code that could be used by attackers to escape from a virtual environment to a real OS. Vulnerabilities are affected by microprocessors with the latest firmware 0x6000832 and 0x6000836, which is victimized in server variants so much as Opteron 6300 or client series FX, as well as Athlon.
When a vulnerability is triggered, the microprocessor can construe part of the information as possible code and execute it, which will lead to an abnormal termination of the process in the virtual machine. Successively, this will circumvent the limitations of the hypervisor and execute code on a real Osmium. In the encase of a server, an attacker, low the guise of a regular user, on a guest virtual machine can gain admittance to the entire server, and with maximum privileges.
The vulnerability is present in the code associated with the processing of non-maskable NMI interrupts and is specific to those versions of the microcode that were mentioned above. Using the overlook / proc / cpuinfo on Linux, you can arrest the identifier (ID) of the processor running on the system. The update itself testament be available for download and in blue-collar mode on the site.
DOWNLOAD HERE
GET AMD fixes vulnerability in microcode of its microprocessors / ESET NOD32 Blog / Sudo Null IT News FREE
Posted by: burrowswituabled.blogspot.com
0 Response to "GET AMD fixes vulnerability in microcode of its microprocessors / ESET NOD32 Blog / Sudo Null IT News FREE"
Post a Comment