Google engineers earlier this year detailed an AMD CPU microcode signature verification vulnerability. For local users with administration/root privileges, it could lead to loading malicious CPU microcode patches on the system. Initially AMD Zen 1 through Zen 4 were affected but the Google security engineers since discovered Zen 5 also could be impacted. BIOS updates are rolling out to address this signature verification issue while the Linux kernel is also being patched for microcode protections on Zen 5.
Google engineers dubbed this AMD CPU microcode signature verification issue as the EntrySign vulnerability. While the Zen 1 through Zen 4 software updates have rolled out to ensure dubious actors can’t apply malicious CPU microcode updates, Zen 5 was only publicly acknowledged this week and BIOS updates are now rolling out there.
As an additional protection in the event of no BIOS update yet, a Linux kernel patch was posted today to ensure no bad CPU microcode can be applied on Zen 5 processors — extending protections in place for earlier Zen processors. This is for all Zen 5 cores, including both the EPYC and Ryzen product lines.
The patch message explains:
“All Zen5 machines out there should get BIOS updates which update to the correct microcode patches addressing the microcode signature issue. However, silly people carve out random microcode blobs from BIOS packages and think are doing other people a service this way…
Block loading of any unreleased standalone Zen5 microcode patches.”
The patch will presumably work its way into the mainline Linux kernel in the coming days for this added protection. AMD’s details on this security advisory via AMD.com.