Description
A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
Reserved 2024-05-23 | Published 2025-07-08 | Updated 2025-07-08 | Assigner
AMDMEDIUM: 5.6CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Problem types
CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
Product status
Default status
affected
MilanPI 1.0.0.G + OS Updates
unaffected
Default status
affected
GenoaPI 1.0.0.E + OS Updates
unaffected
Default status
affected
GenoaPI 1.0.0.E + OS Updates
unaffected
Default status
affected
MI300PI 1.0.0.7 + OS Updates
unaffected
Default status
affected
ComboAM4v2PI 1.2.0.E + OS Updates
unaffected
Default status
affected
ComboAM4v2PI 1.2.0.E + OS Updates
unaffected
Default status
affected
ComboAM5PI 1.2.0.3 + OS Updates
unaffected
ComboAM5PI 1.0.0.a+ OS Updates
unaffected
ComboAM5PI 1.1.0.3c+ OS Updates
unaffected
Default status
affected
ComboAM5PI 1.2.0.3 + OS Updates
unaffected
ComboAM5PI 1.1.0.3c+ OS Updates
unaffected
Default status
affected
StormPeakPI-SP6 1.1.0.0i + OS Updates
unaffected
StormPeakPI-SP6 1.0.0.1k + OS Updates
unaffected
Default status
affected
RembrandtPI-FP7 1.0.0.Bb + OS Updates
unaffected
Default status
affected
RembrandtPI-FP7 1.0.0.Bb + OS Updates
unaffected
Default status
affected
CezannePI-FP6 1.0.1.1b + OS Updates
unaffected
Default status
affected
PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates
unaffected
Default status
affected
PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates
unaffected
Default status
affected
DragonRangeFL1 1.0.0.3g + OS Updates
unaffected
Default status
affected
EmbMilanPI-SP3 1.0.0.A + OS updates
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected
Default status
affected
EmbAM4PI 1.0.0.7 + OS Update
unaffected
Default status
affected
EmbeddedAM5PI 1.0.0.3 + OS updates
unaffected
Default status
affected
Embedded-PI_FP7r2 100C + OS updates
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected
Default status
affected
CezannePI-FP6 1.0.1.1b + OS Updates
unaffected
References
www.amd.com/...es/product-security/bulletin/amd-sb-7029.html
cve.org (CVE-2024-36350)
nvd.nist.gov (CVE-2024-36350)
Download JSON