Safety instructions for AMD-SB-3010 cache-based side-channel attack against SEV
On the 12th of November 2024 AMD published the Security Bulletin AMD-SB-3010. Security vulnerabilities, which enable cache based side channel attacks against SEV (AMD Secure Encrypted Virtualization), were discovered.[1]
Affected systems
- systems with "Zen 1" AMD EPYC 7001 Naples processors
- systems with "Zen 2" AMD EPYC 7002 Rome processors
- systems with "Zen 3" AMD EPYC 7003 Milan processors
- systems with "Zen 4" AMD EPYC 9004 Genoa and Bergamo processors
Embedded systems:
- AMD EPYC Embedded 3000 processors
- AMD EPYC Embedded 7002 processors
- AMD EPYC Embedded 7003 processors
- AMD EPYC Embedded 9004 processors
Solution
AMD recommends software developers to follow best practices of implementing existing procedures to prevent “prime and probe” attacks. Furthermore, the previously published guide in PDF format about spectre attacks ought to be followed. [2]
Updates for products of Thomas-Krenn
Updates for corresponding systems can be found in the download area of Thomas-Krenn. Updates in the download area have been tested to guarantee the stability and compatibility of our systems.
If you need the latest version for your system and it is not available in our download area, you can get it at Asus or Supermicro.
References
- ↑ Cache-Based Side-Channel Attack Against Sev – November 2024 (www.amd.com/en/resources/product-security, 12.11.2024)
- ↑ Software Techniques For Managing Speculation On AMD Processors (www.amd.com)
|
Author: Thomas-Krenn.AG At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers. |

