Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
{ "binaries": [ { "binary_version": "3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1", "binary_name": "amd64-microcode" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-0033.json"
{ "binaries": [ { "binary_version": "3.20191218.1ubuntu1.3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191218.1ubuntu2.3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20250311.1ubuntu0.24.04.1", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20250708.1ubuntu1", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3", "binary_name": "amd64-microcode" } ] }
{ "binaries": [ { "binary_version": "3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3", "binary_name": "amd64-microcode" } ] }