Home

Description

Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests.

PUBLISHED Reserved 2024-01-03 | Published 2025-09-05 | Updated 2025-09-05 | Assigner AMD




LOW: 3.2CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-459 Incomplete Cleanup

Product status

Default status
affected

MilanPI 1.0.0.D
unaffected

Default status
affected

GenoaPI 1.0.0.C
unaffected

Default status
affected

GenoaPI 1.0.0.C
unaffected

Default status
affected

ChagallWSPI-sWRX8 1.0.0.8
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1
unaffected

Default status
affected

RembrandtPI-FP7/FP7r2_1.0.0.B
unaffected

Default status
affected

ComboAM4v2 1.2.0.Cb
unaffected

Default status
affected

ComboAM5 1.2.0.1
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.1.0.3
unaffected

Default status
affected

RembrandtPI-FP7/FP7r2_1.0.0.B
unaffected

Default status
affected

DragonRangeFL1 1.0.0.3e
unaffected

Default status
affected

ChagallWSPI-sWRX8 1.0.0.8
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1
unaffected

Default status
affected

ComboAM5 1.2.0.1
unaffected

Default status
affected

EmbMilanPI-SP3 1.0.0.9
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.9
unaffected

Default status
affected

EmbeddedPhoenixPI-FP7r2_1.2.0.0
unaffected

Default status
affected

EmbeddedAM5PI 1.0.0.3
unaffected

Default status
affected

EmbAM4PI 1.0.0.7
unaffected

Default status
affected

Embedded-PI_FP7r2 100A
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html

www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html

www.amd.com/...es/product-security/bulletin/AMD-SB-3014.html

cve.org (CVE-2024-21977)

nvd.nist.gov (CVE-2024-21977)

Download JSON