AMD hadn’t published a list when the article was first run, but it has since been updated:
but it pointed to a full list of affected products that can be found on its website’s [security bulletin page](but it pointed to a full list of affected products that can be found on its website’s security bulletin page..
A list of the effected processors would’ve been nice, Wired.
The article links to this:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html
If attacker has a ring 0 access he can already screw you up any way he wants
that’s all well and good, I was just responding to someone who wanted the list of affected products
It only mentions ring 0 access in your link, ergo they responded to your post because it was the most appropriate. At least that’s how I see it.
The link includes ‘CVE-2023-31315’
True. This does allow for persistent recurring infection post clean and cold boot.
Interesting flaw to keep an eye on.
AMD hadn’t published a list when the article was first run, but it has since been updated: