Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-0033

Опубликовано: 14 окт. 2025
Источник: debian

Описание

Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
amd64-microcodeunfixedpackage

Примечания

  • https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3020.html

Связанные уязвимости

CVSS3: 6
ubuntu
4 месяца назад

Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

CVSS3: 6
nvd
4 месяца назад

Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

msrc
4 месяца назад

AMD CVE-2025-0033: RMP Corruption During SNP Initialization

CVSS3: 6
github
4 месяца назад

Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

CVSS3: 8.2
fstec
4 месяца назад

Уязвимость прошивки SEV-SNP микропрограммного обеспечения графических процессоров AMD, связанная с ошибками разграничения доступа, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации