AMD Zen 5 Chips: Critical Bug Found, But a Fix is Coming Soon (2025)

Imagine discovering that a critical component of your computer's security is flawed, leaving your data potentially exposed. That's exactly what's happening with AMD's Zen 5 chips, which have been hit by a significant bug affecting their pseudorandom number generator. But here's the silver lining: AMD is already working on a fix, so there's no need to panic—yet.

ZDNET's Key Takeaways:
- Widespread Impact: This bug affects a broad range of Zen 5 generation chips, from high-performance EPYC servers to popular Ryzen consumer processors.
- Security at Risk: The issue compromises the processor's ability to generate truly random numbers, which are crucial for cryptographic operations.
- Solution in Sight: AMD has confirmed that fixes are in the pipeline, with updates expected to roll out soon.

The problem was first identified by Meta engineer Gregory Price, who detailed his findings in a Linux kernel mailing list. Price explained that under certain conditions, Zen 5 chips using the RDSEED instruction can produce a 'random' result of 0 over 10% of the time, even when the operation is marked as successful. To put it simply, RDSEED is supposed to gather 'environmental entropy'—like thermal and voltage fluctuations—to generate random numbers, much like rolling a set of dice. But in this case, it's as if the dice are occasionally left unrolled, yet the system acts like everything is fine. And this is the part most people miss: when these 'unrandom' numbers are used for cryptographic purposes, they can seriously undermine security, making data more vulnerable to attacks.

Why This Matters:
Random number generation is a cornerstone of cybersecurity. If these numbers are predictable, it’s like using a weak lock on a valuable safe. This bug isn’t just a minor glitch—it’s a significant vulnerability that could affect everything from personal computers to enterprise servers.

Affected Processors:
- EPYC 9005 Series
- Ryzen 9000 and 9000HX Series
- Ryzen AI 300, AI Z2 Extreme, and AI Max 300 Series
- Ryzen Threadripper 9000 and Threadripper PRO 9000 WX-Series
- Ryzen Z2 Series Processors Extreme
- EPYC Embedded 4005, 9005, and 9000 Series

Temporary Workaround:
Fortunately, the bug only affects the 16-bit and 32-bit versions of RDSEED. Users can rely on the 64-bit version as a temporary solution until the official fix is released.

AMD's Response:
AMD is addressing the issue with AGESA and microcode updates. The patch for the EPYC 9005 Series is already rolling out, and updates for other processors are expected by January. But here's where it gets controversial: while AMD's swift response is commendable, this isn’t the first time their processors have faced such issues. It raises questions about the robustness of their testing processes and whether more could be done to prevent these vulnerabilities in the first place.

Food for Thought:
How much should we rely on hardware manufacturers to ensure the security of their products? And what role should independent researchers and the open-source community play in identifying and fixing these flaws? Let us know your thoughts in the comments below.

Stay informed with the latest tech news by subscribing to our Tech Update newsletter and following ZDNET for more in-depth coverage.

AMD Zen 5 Chips: Critical Bug Found, But a Fix is Coming Soon (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6366

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.