Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-29943

Опубликовано: 16 янв. 2026
Источник: debian
EPSS Низкий

Описание

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
amd64-microcodefixed3.20251202.1package

Примечания

  • https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3027.html

EPSS

Процентиль: 3%
0.00017
Низкий

Связанные уязвимости

ubuntu
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

nvd
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

github
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

CVSS3: 3.2
fstec
21 день назад

Уязвимость реализации защитного механизма SEV-SNP микропрограммного обеспечения графических процессоров AMD, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 3%
0.00017
Низкий