Month: July 2023
Women’s World Cup: The Tournament’s Wildest Group Will Finally Get Its Answers
The permutations are dizzying for Group A, with Norway, New Zealand, the Philippines and Switzerland all in play.
The permutations are dizzying for Group A, with Norway, New Zealand, the Philippines and Switzerland all in play.
Facebook opened its doors to researchers. What they found paints a complicated picture of social media and echo chambers.
submitted by /u/kevins_child [link] [comments]
submitted by /u/kevins_child
[link] [comments]
AMD ‘Zenbleed’ Bug Leaks Data From Zen 2 Ryzen, EPYC CPUs
Monday a researcher with Google Information Security posted about a new vulnerability he independently found in AMD’s Zen 2 processors. Tom’s Hardware reports:
The ‘Zenbleed’ vulnerability spans the entire Zen 2 product stack, including AMD’s EPYC data center processors and the Ryzen 3000/4000/5000 CPUs, allowing the theft of protected information from the CPU, such as encryption keys and user logins. The attack does not require physical access to the computer or server and can even be executed via JavaScript on a webpage…
AMD added the AMD-SB-7008 Bulletin several hours later. AMD has patches ready for its EPYC 7002 ‘Rome’ processors now, but it will not patch its consumer Zen 2 Ryzen 3000, 4000, and some 5000-series chips until November and December of this year… AMD hasn’t given specific details of any performance impacts but did issue the following statement to Tom’s Hardware: “Any performance impact will vary depending on workload and system configuration. AMD is not aware of any known exploit of the described vulnerability outside the research environment…”
AMD describes the exploit much more simply, saying, “Under specific microarchitectural circumstances, a register in “Zen 2″ CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information.”
The article includes a list of the impacted processors with a schedule for the release of the updated firmware to OEMs.
The Google Information Security researcher who discovered the bug is sharing research on different CPU behaviors, and says the bug can be patched through software on multiple operating systems (e.g., “you can set the chicken bit DE_CFG[9]”) — but this might result in a performance penalty.
Thanks to long-time Slashdot reader waspleg for sharing the news.
Read more of this story at Slashdot.
Monday a researcher with Google Information Security posted about a new vulnerability he independently found in AMD’s Zen 2 processors. Tom’s Hardware reports:
The ‘Zenbleed’ vulnerability spans the entire Zen 2 product stack, including AMD’s EPYC data center processors and the Ryzen 3000/4000/5000 CPUs, allowing the theft of protected information from the CPU, such as encryption keys and user logins. The attack does not require physical access to the computer or server and can even be executed via JavaScript on a webpage…
AMD added the AMD-SB-7008 Bulletin several hours later. AMD has patches ready for its EPYC 7002 ‘Rome’ processors now, but it will not patch its consumer Zen 2 Ryzen 3000, 4000, and some 5000-series chips until November and December of this year… AMD hasn’t given specific details of any performance impacts but did issue the following statement to Tom’s Hardware: “Any performance impact will vary depending on workload and system configuration. AMD is not aware of any known exploit of the described vulnerability outside the research environment…”
AMD describes the exploit much more simply, saying, “Under specific microarchitectural circumstances, a register in “Zen 2″ CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information.”
The article includes a list of the impacted processors with a schedule for the release of the updated firmware to OEMs.
The Google Information Security researcher who discovered the bug is sharing research on different CPU behaviors, and says the bug can be patched through software on multiple operating systems (e.g., “you can set the chicken bit DE_CFG[9]”) — but this might result in a performance penalty.
Thanks to long-time Slashdot reader waspleg for sharing the news.
Read more of this story at Slashdot.
Terence Crawford Knocks Out Errol Spence in One-Sided Bout
The rare matchup of two of the best pound-for-pound boxers ended with Crawford dominating the whole fight.
The rare matchup of two of the best pound-for-pound boxers ended with Crawford dominating the whole fight.
Germany vs. Colombia: How to Watch FIFA Women’s World Cup 2023 Game Live From Anywhere – CNET
The two-time world champions take on the South Americans in Sydney.
The two-time world champions take on the South Americans in Sydney.
French Invent New Class of Wind Power Vehicle. Crushing Americans in Future of Renewables
submitted by /u/The_Bridge_Imperium [link] [comments]
submitted by /u/The_Bridge_Imperium
[link] [comments]