[coreboot] Remote security exploit in all 2008+ Intel platforms

ron minnich rminnich at gmail.com
Mon May 1 18:20:33 CEST 2017


The ME is the WEP of motherboards.

On Mon, May 1, 2017 at 9:18 AM persmule <persmule at gmail.com> wrote:

> We could just remove or cleanse <https://github.com/corna/me_cleaner> the
> ME to seal this loophole.
>
>
> 在 2017年05月02日 00:13, Sam Kuper 写道:
>
> On 01/05/2017, Shawn <citypw at gmail.com> <citypw at gmail.com> wrote:
>
> https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
>
>
> The piece states, "on April 25, Intel released a firmware fix for this
> unnamed issue. It affects every Intel machine from Nehalem in 2008 to
> Kaby Lake in 2017."
>
> Has anyone here got a link describing or including the fix, either
> directly from Intel, or from an OEM? At the moment, there are no
> advisories listed at https://security-center.intel.com/advisories.aspx
> newer than April 3, so presumably either the piece is false, or else
> the firmware fix was released to OEMs but not publicly.
>
> Discussion elsewhere:
> https://news.ycombinator.com/item?id=14237266
> https://www.reddit.com/r/linux/comments/68ma1a/every_intel_platform_with_amt_ism_and_sbt_from/
>
>
> --
> coreboot mailing list: coreboot at coreboot.org
> https://mail.coreboot.org/mailman/listinfo/coreboot
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.coreboot.org/pipermail/coreboot/attachments/20170501/1043a7ce/attachment.html>


More information about the coreboot mailing list