Описание
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | needed | |
| esm-infra-legacy/trusty | ignored | no real-world users |
| esm-infra/bionic | needed | |
| esm-infra/focal | needed | |
| esm-infra/xenial | needed | |
| jammy | needed | |
| noble | needed | |
| questing | needed | |
| upstream | released | 3.20251202.1 |
Показывать по
EPSS
Связанные уязвимости
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
Write what were condition within AMD CPUs may allow an admin-privilege ...
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
Уязвимость реализации защитного механизма SEV-SNP микропрограммного обеспечения графических процессоров AMD, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
EPSS