Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-29943

Опубликовано: 16 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

РелизСтатусПримечание
devel

needed

esm-infra-legacy/trusty

ignored

no real-world users
esm-infra/bionic

needed

esm-infra/focal

needed

esm-infra/xenial

needed

jammy

needed

noble

needed

questing

needed

upstream

released

3.20251202.1

Показывать по

EPSS

Процентиль: 3%
0.00017
Низкий

Связанные уязвимости

nvd
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

debian
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privilege ...

github
19 дней назад

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

CVSS3: 3.2
fstec
21 день назад

Уязвимость реализации защитного механизма SEV-SNP микропрограммного обеспечения графических процессоров AMD, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 3%
0.00017
Низкий