Comment on AMD confirms security vulnerability in every Zen 1 to Zen 5 processor
InnerScientist@lemmy.world 1 week ago
EntrySign is a vulnerability that enables attackers with ring 0 or kernel-level access to bypass safeguards.
So almost no security impact and no performance change?
kata1yst@sh.itjust.works 1 week ago
You must be new here.
Joking. But seriously, on Linux you can bypass mitigations with basically no security impact if you’re not a cloud provider and get a significant performance boost.
InnerScientist@lemmy.world 1 week ago
I don’t think this will affect performance unless you depend on having to quickly update the CPU microcode multiple times a second.
kata1yst@sh.itjust.works 1 week ago
I apologize for being glib.
Agreed, shouldn’t affect performance. But also depends on how they see best to patch the vulnerability. The microcode patch mechanism is the currently understood vector, but might not be the only way to exploit the actual underlying vulnerability.
I remember the early days of Spectre when the mitigation was “disable branch prediction”, then later they patched a more targeted, performant solution in.