Safety instructions for AMD-SB-3010 cache-based side-channel attack against SEV

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On the 12th of November 2024 AMD published the Security Bulletin AMD-SB-3010. Security vulnerabilities, which enable cache based side channel attacks against SEV (AMD Secure Encrypted Virtualization), were discovered.[1]

Affected systems

Embedded systems:

  • AMD EPYC Embedded 3000 processors
  • AMD EPYC Embedded 7002 processors
  • AMD EPYC Embedded 7003 processors
  • AMD EPYC Embedded 9004 processors

Solution

AMD recommends software developers to follow best practices of implementing existing procedures to prevent “prime and probe” attacks. Furthermore, the previously published guide in PDF format about spectre attacks ought to be followed. [2]

Updates for products of Thomas-Krenn

Updates for corresponding systems can be found in the download area of Thomas-Krenn. Updates in the download area have been tested to guarantee the stability and compatibility of our systems.

If you need the latest version for your system and it is not available in our download area, you can get it at Asus or Supermicro.

References


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.