Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-36350

Опубликовано: 08 июл. 2025
Источник: debian
EPSS Низкий

Описание

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
amd64-microcodeunfixedpackage
linuxfixed6.12.37-1package
xenunfixedpackage
xenend-of-lifebullseyepackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-471.html

  • https://www.amd.com/content/dam/amd/en/documents/resources/bulletin/technical-guidance-for-mitigating-transient-scheduler-attacks.pdf

  • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html

  • https://aka.ms/enter-exit-leak

  • https://www.microsoft.com/en-us/research/wp-content/uploads/2025/07/Enter-Exit-SP26.pdf

EPSS

Процентиль: 4%
0.00022
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
12 дней назад

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

CVSS3: 5.6
redhat
12 дней назад

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

CVSS3: 5.6
nvd
12 дней назад

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

CVSS3: 5.6
msrc
12 дней назад

AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue

CVSS3: 5.6
github
12 дней назад

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

EPSS

Процентиль: 4%
0.00022
Низкий