Количество 9
Количество 9

CVE-2022-27672
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

CVE-2022-27672
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

CVE-2022-27672
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
CVE-2022-27672
When SMT is enabled, certain AMD processors may speculatively execute ...

SUSE-SU-2023:0692-1
Security update for xen
GHSA-vxpc-466w-pjjv
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

BDU:2023-00934
Уязвимость технологии SMT процессоров AMD, позволяющая нарушителю раскрыть защищаемую информацию
ELSA-2023-12256
ELSA-2023-12256: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12255
ELSA-2023-12255: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-27672 When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-27672 When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-27672 When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад |
CVE-2022-27672 When SMT is enabled, certain AMD processors may speculatively execute ... | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0692-1 Security update for xen | 0% Низкий | больше 2 лет назад | |
GHSA-vxpc-466w-pjjv When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. | CVSS3: 4.7 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-00934 Уязвимость технологии SMT процессоров AMD, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.6 | 0% Низкий | больше 2 лет назад |
ELSA-2023-12256 ELSA-2023-12256: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12255 ELSA-2023-12255: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 лет назад |
Уязвимостей на страницу