Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
{ "binaries": [ { "binary_version": "3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1", "binary_name": "amd64-microcode" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-62626.json"
{ "binaries": [ { "binary_version": "3.20191218.1ubuntu1.3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191218.1ubuntu2.3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20250311.1ubuntu0.24.04.1", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20250708.0ubuntu0.25.04.2", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20250708.1ubuntu1", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3", "binary_name": "amd64-microcode" } ] }