<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AMD Archives - OVHcloud Blog</title>
	<atom:link href="https://blog.ovhcloud.com/tag/amd/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ovhcloud.com/tag/amd/</link>
	<description>Innovation for Freedom</description>
	<lastBuildDate>Fri, 28 Jul 2023 14:09:11 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.ovhcloud.com/wp-content/uploads/2019/07/cropped-cropped-nouveau-logo-ovh-rebranding-32x32.gif</url>
	<title>AMD Archives - OVHcloud Blog</title>
	<link>https://blog.ovhcloud.com/tag/amd/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CVE-2023-20593/Zenbleed</title>
		<link>https://blog.ovhcloud.com/cve-2023-20593-zenbleed/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 13:52:25 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=25638</guid>

					<description><![CDATA[On July 24th 2023, AMD has issued a security bulletin disclosing a vulnerability in its Zen2 computer processor microarchitecture. Named “Cross-Process Information Leak” by AMD, the vulnerability is also known as &#8220;Zenbleed&#8221;. Labelled CVE-2023-20593 and rated by AMD as Medium, the issue allows an attacker to potentially access sensitive information processed by the CPU in [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcve-2023-20593-zenbleed%2F&amp;action_name=CVE-2023-20593%2FZenbleed&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>On July 24th 2023, AMD has issued a security bulletin disclosing a vulnerability in its Zen2 computer processor microarchitecture. Named “Cross-Process Information Leak” by AMD, the vulnerability is also known as &#8220;Zenbleed&#8221;. Labelled CVE-2023-20593 and rated by AMD as Medium, the issue allows an attacker to potentially access sensitive information processed by the CPU in specific circumstances. The issue affects all software running on the AMD Zen2 based processors, including virtual machines, sandboxes, containers, and processes. Exploitation software is likely available, and we expect that attacks based on this vulnerability will occur soon.</p>



<figure class="wp-block-image aligncenter size-large is-resized"><img fetchpriority="high" decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-1024x538.png" alt="" class="wp-image-25656" width="512" height="269" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-1024x538.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-300x158.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-768x404.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed.png 1199w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<p>All AMD Zen2 CPUs, including EPYC Rome processors, are vulnerable:</p>



<ul class="wp-block-list">
<li>AMD Ryzen 3000 Series Processors</li>



<li>AMD Ryzen PRO 3000 Series Processors</li>



<li>AMD Ryzen Threadripper 3000 Series Processors</li>



<li>AMD Ryzen 4000 Series Processors with Radeon Graphics</li>



<li>AMD Ryzen PRO 4000 Series Processors</li>



<li>AMD Ryzen 5000 Series Processors with Radeon Graphics</li>



<li>AMD Ryzen 7020 Series Processors with Radeon Graphics</li>



<li>2nd Gen AMD EPYC &#8220;Rome&#8221; Processors</li>
</ul>



<h2 class="wp-block-heading">Impacts on OVHcloud products</h2>



<p>In response to that event, we immediately reviewed the security bulletin and technical information and determined the following potential impact on our products.</p>



<div class="inherit-container-width wp-block-group is-layout-constrained wp-block-group-is-layout-constrained"><div class="wp-block-group__inner-container">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<figure class="wp-block-table is-style-regular"><table><tbody><tr><td><strong>Public Cloud</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Hosted Private Cloud</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Web Hosting &amp; Domains</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Bare Metal cloud</strong></td><td>ADVANCE-1<br>Advance STOR-1<br>Advance STOR-2<br>Game-1<br>Game-2<br>HGR-SDS-2<br>HGR-HCI-4<br>HGR-HCI-5<br>HGR-HCI-6<br>Infra-2<br>Rise-GAME-1<br>Rise-GAME-2<br>Scale-1<br>Scale-2<br>Scale-3</td><td><i class="fas fa-plus"></i> <mark style="background-color:var(--ast-global-color-0)" class="has-inline-color has-ast-global-color-5-color">Potentially impacted</mark><br>(only AMD Zen2 powered servers)</td></tr><tr><td></td><td>Other commercial ranges of dedicated servers</td><td><i class="fas fa-check"></i> Not impacted</td></tr></tbody></table></figure>
</div>
</div>
</div></div>



<h2 class="wp-block-heading">How to mitigate the vulnerability:</h2>



<h3 class="wp-block-heading">Customer-initiated mitigation</h3>



<h4 class="wp-block-heading">Loading a patched microcode at boot with a firmware package update</h4>



<p>This solution will trigger the update of the processor microcode through an operating system update (the linux-firmware package for instance). You might do it as soon your OS editor or community distribute the updated package. This method is dependent on your distribution or Operating system editor and will only work if the appropriate microcode has been provided by AMD. As of today, only &#8220;Zen2 Rome&#8221; and &#8220;Zen2 Castle Peak&#8221; are covered by this method.</p>



<h4 class="wp-block-heading">Mitigation with an updated Kernel</h4>



<p>When an update of the microcode is not available via a firmware update package, you may update the Kernel with a version that implements a mitigation by configuring a so-called &#8220;chicken bit&#8221; to deactivate the faulty processor feature. It might impact the performance of the system. This solution will be included by OS editors when they backport a new version of the Linux kernel. We recommend our customers to follow this mitigation strategy in priority since it is the most efficient as it doesn&#8217;t depend on whether an updated microcode is provided by the hardware vendor.</p>



<p>As an alternative, you might set the chicken bit manually without relying on the kernel update. However, we do not recommend this solution that may be risky for your system.</p>



<h3 class="wp-block-heading">OVHcloud-initiated mitigation</h3>



<p>OVHcloud teams are working to implement transparent solutions that will ensure the patched microcode is updated in a transparent way for our customers. Those solutions will be deployed progressively on our servers. Two main options are being evaluated.</p>



<h4 class="wp-block-heading">Using OVHcloud iPXE</h4>



<p>The microcode update may be loaded by the bootloader when the standard OVHcloud netboot is used by customers (the most common configuration). Once it is available, rebooting the server through the OVHcloud customer interface will cause it to load the updated microcode before booting to disk, which will mitigate the vulnerability. However, if you&#8217;re booting on disk without using the OVHcloud netboot system, the mitigation will not be applied and you should consider relying on the Operating-System-level mitigation.</p>



<h4 class="wp-block-heading">Using UEFI</h4>



<p>The UEFI firmware update may update the CPU microcode at boot. UEFI firmware updates including the patched microcode will likely be made available by motherboard manufacturers within the next months. Once available, OVHcloud will include this patched microcode on the UEFI for any new delivered server. Customers will then be able to request an UEFI firmware update by contacting the support.</p>



<h2 class="wp-block-heading">As an administrator of a potentially vulnerable server, what should I do?</h2>



<p>The first action is to check if your server is impacted by the vulnerability using the following tool (Linux-only) developed by our team:</p>



<pre class="wp-block-code"><code class=""># wget https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
# sh spectre-meltdown-checker.sh --variant zenbleed --explain</code></pre>



<p>If the tool says &#8220;NOT VULNERABLE&#8221;, then you are already safe and no further action is needed.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="828" height="111" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image.png" alt="" class="wp-image-25642" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image.png 828w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-300x40.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-768x103.png 768w" sizes="(max-width: 828px) 100vw, 828px" /></figure>



<p>If the tool says &#8220;VULNERABLE&#8221;, you should then evaluate your exposition to the threat. </p>



<figure class="wp-block-image size-full"><img decoding="async" width="853" height="207" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2.png" alt="" class="wp-image-25644" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2.png 853w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2-300x73.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2-768x186.png 768w" sizes="(max-width: 853px) 100vw, 853px" /></figure>



<p>It is necessary to determine if the server context allows to run code from an untrusted origin. If the server is used to provide services to untrusted end-users that can execute code (VPS, Container, mutualized hosting, etc.), or is used as a desktop in the cloud browsing the Web (hence possibly running 3rd party Javascript payloads), then your server might be at risk. If the server is used only by trusted users and/or does not allow to run untrusted code, the risk of exploitation is probably quite low. Please note however that this vulnerability might allow an attacker to gain extra privilege in a chained attack, it could be used for persistence or lateral movement in a complex kill chain.</p>



<p>Based on this evaluation, you should determine the emergency to trigger a mitigation and choose the most appropriate one.</p>



<h2 class="wp-block-heading">What OVHcloud is working on:</h2>



<p>Our technical and support teams are working to ensure the risk is lowered for every of our customer impacted by the vulnerability. We mostly focus on:</p>



<ul class="wp-block-list">
<li>Informing impacted customers to ensure they take the risk into account in their operations and implement mitigation appropriately</li>



<li>Developing and integrating updates in our automation to cover the risk in a transparent way for our customers.</li>



<li>Security watch of the vulnerability exploitation in the wild to define the appropriate extra mitigations we can implement to protect our customer infrastructures</li>
</ul>



<h2 class="wp-block-heading">External references</h2>



<p><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html</a></p>



<p><a href="https://lock.cmpxchg8b.com/zenbleed.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://lock.cmpxchg8b.com/zenbleed.html</a></p>



<p><a href="https://www.openwall.com/lists/oss-security/2023/07/24/1" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.openwall.com/lists/oss-security/2023/07/24/1</a></p>



<p><a href="https://github.com/torvalds/linux/commit/522b1d69219d8f083173819fde04f994aa051a98" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/torvalds/linux/commit/522b1d69219d8f083173819fde04f994aa051a98</a></p>



<p><a href="https://github.com/speed47/spectre-meltdown-checker/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/speed47/spectre-meltdown-checker/</a></p>



<p><a href="https://lists.debian.org/debian-security-announce/2023/msg00151.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://lists.debian.org/debian-security-announce/2023/msg00151.html</a></p>



<p><a href="https://packages.debian.org/bullseye/amd64/amd64-microcode" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://packages.debian.org/bullseye/amd64/amd64-microcode</a></p>



<p><a href="https://ubuntu.com/security/CVE-2023-20593" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://ubuntu.com/security/CVE-2023-20593</a></p>



<p><a href="https://almalinux.org/fr/blog/zenbleed-patch-call-for-testing/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://almalinux.org/fr/blog/zenbleed-patch-call-for-testing/</a></p>



<p><a href="https://access.redhat.com/security/cve/cve-2023-20593" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://access.redhat.com/security/cve/cve-2023-20593</a></p>



<p><a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=0bc3126c9cfa0b8c761483215c25382f831a7c6f" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=0bc3126c9cfa0b8c761483215c25382f831a7c6f</a></p>



<p><a href="https://github.com/google/security-research/tree/master/pocs/cpus/zenbleed" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/google/security-research/tree/master/pocs/cpus/zenbleed</a></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcve-2023-20593-zenbleed%2F&amp;action_name=CVE-2023-20593%2FZenbleed&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
