We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-36357



Description

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

Reserved 2024-05-23 | Published 2025-07-08 | Updated 2025-07-09 | Assigner AMD


MEDIUM: 5.6CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution

Product status

Default status
affected

MilanPI 1.0.0.G + OS Updates
unaffected

Default status
affected

GenoaPI 1.0.0.E + OS Updates
unaffected

Default status
affected

GenoaPI 1.0.0.E + OS Updates
unaffected

Default status
affected

MI300PI 1.0.0.7 + OS Updates
unaffected

Default status
affected

ComboAM4v2PI 1.2.0.E + OS Updates
unaffected

Default status
affected

ComboAM4v2PI 1.2.0.E + OS Updates
unaffected

Default status
affected

ComboAM5PI 1.2.0.3 + OS Updates
unaffected

ComboAM5PI 1.0.0.a+ OS Updates
unaffected

ComboAM5PI 1.1.0.3c+ OS Updates
unaffected

Default status
affected

ComboAM5PI 1.2.0.3 + OS Updates
unaffected

ComboAM5PI 1.1.0.3c+ OS Updates
unaffected

Default status
affected

StormPeakPI-SP6 1.1.0.0i + OS Updates
unaffected

StormPeakPI-SP6 1.0.0.1k + OS Updates
unaffected

Default status
affected

RembrandtPI-FP7 1.0.0.Bb + OS Updates
unaffected

Default status
affected

RembrandtPI-FP7 1.0.0.Bb + OS Updates
unaffected

Default status
affected

CezannePI-FP6 1.0.1.1b + OS Updates
unaffected

Default status
affected

PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates
unaffected

Default status
affected

PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates
unaffected

Default status
affected

DragonRangeFL1 1.0.0.3g + OS Updates
unaffected

Default status
affected

EmbMilanPI-SP3 1.0.0.A + OS updates
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected

Default status
affected

EmbAM4PI 1.0.0.7 + OS Update
unaffected

Default status
affected

EmbeddedAM5PI 1.0.0.3 + OS updates
unaffected

Default status
affected

Embedded-PI_FP7r2 100C + OS updates
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.9 + OS updates
unaffected

Default status
affected

CezannePI-FP6 1.0.1.1b + OS Updates
unaffected

References

www.amd.com/...es/product-security/bulletin/amd-sb-7029.html

cve.org (CVE-2024-36357)

nvd.nist.gov (CVE-2024-36357)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-36357

Support options

Helpdesk Chat, Email, Knowledgebase