Логотип exploitDog
bind:"GHSA-4hrg-cvr4-ff8f" OR bind:"CVE-2024-56721"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-4hrg-cvr4-ff8f" OR bind:"CVE-2024-56721"

Количество 10

Количество 10

github логотип

GHSA-4hrg-cvr4-ff8f

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2024-56721

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2024-56721

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-56721

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2024-56721

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: x ...

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-07218

11 месяцев назад

Уязвимость функции init_amd_bd() модуля arch/x86/kernel/cpu/amd.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации.

CVSS3: 7.1
EPSS: Низкий
rocky логотип

RLSA-2025:13598

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-13598

3 месяца назад

ELSA-2025-13598: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20530

3 месяца назад

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20480

4 месяца назад

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4hrg-cvr4-ff8f

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
0%
Низкий
10 месяцев назад
ubuntu логотип
CVE-2024-56721

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-56721

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 6
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-56721

In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microcode array requires an empty entry at the end. Otherwise x86_match_cpu_with_stepping() will continue iterate the array after it ended. Add an empty entry to erratum_1386_microcode to its end.

CVSS3: 7.1
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-56721

In the Linux kernel, the following vulnerability has been resolved: x ...

CVSS3: 7.1
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-07218

Уязвимость функции init_amd_bd() модуля arch/x86/kernel/cpu/amd.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации.

CVSS3: 7.1
0%
Низкий
11 месяцев назад
rocky логотип
RLSA-2025:13598

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-13598

ELSA-2025-13598: kernel security update (MODERATE)

3 месяца назад
oracle-oval логотип
ELSA-2025-20530

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20480

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад

Уязвимостей на страницу