Home

Description

A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.

PUBLISHED Reserved 2025-03-12 | Published 2025-11-21 | Updated 2025-11-23 | Assigner AMD




MEDIUM: 5.3CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

Problem types

CWE-459 Incomplete Cleanup

Product status

Default status
affected

Genoa 1.0.0.E
unaffected

Default status
affected

Turin 1.0.0.6
unaffected

Default status
affected

Genoa 1.0.0.E
unaffected

Default status
affected

EmbMilanPI-SP3 v9 1.0.0.B
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.A
unaffected

Default status
affected

EmbTurinPI-SP5 1.0.0.1
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.A
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.A
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-3029.html

cve.org (CVE-2025-29934)

nvd.nist.gov (CVE-2025-29934)

Download JSON