CVE-2024-36350
Published: July 9, 2025Last modified: July 14, 2025
Description
A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.6 |
| Attack Vector | LOCAL |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | CHANGED |
| Confidentiality | HIGH |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-firmware | Unknown (20221109-r0) |
| Stream | linux-firmware | Unknown (20230625-r0) |
References
- http://www.openwall.com/lists/oss-security/2025/08/28/2
- http://xenbits.xen.org/xsa/advisory-471.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html