this post was submitted on 11 Apr 2025
23 points (100.0% liked)

Hardware

405 readers
31 users here now

A community for news and discussion about the hardware side of technology.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.


If someone is interested in moderating this community, message @[email protected].

founded 8 months ago
MODERATORS
top 1 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

EntrySign is a vulnerability that enables attackers with ring 0 or kernel-level access to bypass safeguards.

Oh yeah, this is the same one that was in the news a while ago.

ComboAM5PI 1.2.0.3c AGESA

~~On my mobo it's been out since 2021/8/5 if I understand correctly, so it's been fixed for a few years now? So I guess anyone with a newer version is safe.~~

edit: Apparently AGESA V2 1.2.0.E is the one with the fix, what's with the numbering in the article lol

edit2: AMD's page on the fix, indeed fixed in ComboAM4v2PI 1.2.0.E, article is using a version for a different series. Look for your processor/series on that page for accurate bios version ig