Description
Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests.
Problem types
Product status
MilanPI 1.0.0.D
GenoaPI 1.0.0.C
GenoaPI 1.0.0.C
ChagallWSPI-sWRX8 1.0.0.8
CezannePI-FP6_1.0.1.1
RembrandtPI-FP7/FP7r2_1.0.0.B
ComboAM4v2 1.2.0.Cb
ComboAM5 1.2.0.1
PhoenixPI-FP8-FP7_1.1.0.3
RembrandtPI-FP7/FP7r2_1.0.0.B
DragonRangeFL1 1.0.0.3e
ChagallWSPI-sWRX8 1.0.0.8
CezannePI-FP6_1.0.1.1
ComboAM5 1.2.0.1
EmbMilanPI-SP3 1.0.0.9
EmbGenoaPI-SP5 1.0.0.9
EmbeddedPhoenixPI-FP7r2_1.2.0.0
EmbeddedAM5PI 1.0.0.3
EmbAM4PI 1.0.0.7
Embedded-PI_FP7r2 100A
References
www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html
www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html
www.amd.com/...es/product-security/bulletin/AMD-SB-3014.html