Bug 2350725 (CVE-2024-36350)

Summary: CVE-2024-36350 kernel: information leak via transient execution vulnerability in some AMD processors
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: daltonminer, llong, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2025-07-08   

Description OSIDB Bzimport 2025-03-07 20:48:01 UTC
A transient execution vulnerability in some AMD processors may allow
an attacker to infer data from previous stores, potentially resulting in the
leakage of privileged information.

Comment 2 Waiman Long 2025-07-10 12:58:11 UTC
Fixing this CVE requires both microcode and OS kernel update. So there should be separate trackers for kernel and microcode.

Comment 6 errata-xmlrpc 2025-11-10 01:02:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:19930 https://access.redhat.com/errata/RHSA-2025:19930

Comment 7 errata-xmlrpc 2025-11-11 08:03:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:20095 https://access.redhat.com/errata/RHSA-2025:20095

Comment 8 errata-xmlrpc 2025-11-11 10:26:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:20518 https://access.redhat.com/errata/RHSA-2025:20518