CVE-2025-68313
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the RDSEED instruction on AMD Zen5 CPUs, where the 16-bit and 32-bit register output variants can return a random value of 0 at a rate inconsistent with expected randomness, while incorrectly signaling success. This means the CPU may provide non-random data as if it were valid random data.
How can this vulnerability impact me? :
The vulnerability can impact systems relying on RDSEED for random number generation by providing non-random values that appear valid. This can weaken cryptographic operations or any security mechanisms depending on high-quality randomness, potentially leading to security risks.
What immediate steps should I take to mitigate this vulnerability?
Apply the Linux kernel update that includes the fix for the RDSEED issue on AMD Zen5 CPUs, which adds microcode revision checks to address the problem.