DEBIAN-CVE-2024-36357

Source
https://security-tracker.debian.org/tracker/CVE-2024-36357
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-36357
Upstream
Downstream
Published
2025-07-08T17:15:31.723Z
Modified
2025-12-13T05:15:39.160755Z
Severity
  • 5.6 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

References

Affected packages

Debian:11

amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1
3.20230719.1~deb12u1
3.20230719.1
3.20230808.1
3.20230808.1.1~deb11u1
3.20230808.1.1~deb12u1
3.20230808.1.1
3.20230823.1
3.20231019.1
3.20240116.2
3.20240116.2+nmu1
3.20240710.1
3.20240710.2~deb11u1
3.20240710.2~deb12u1
3.20240710.2
3.20240820.1~deb11u1
3.20240820.1~deb12u1
3.20240820.1
3.20250311.1~deb11u1
3.20250311.1~deb12u1
3.20250311.1
3.20251202.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.244-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1
5.10.178-1
5.10.178-2
5.10.178-3
5.10.179-1
5.10.179-2
5.10.179-3
5.10.179-4
5.10.179-5
5.10.191-1
5.10.197-1
5.10.205-1
5.10.205-2
5.10.209-1
5.10.209-2
5.10.216-1
5.10.218-1
5.10.221-1
5.10.223-1
5.10.226-1
5.10.234-1
5.10.237-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

linux-6.1

Package

Name
linux-6.1
Purl
pkg:deb/debian/linux-6.1?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.153-1~deb11u1

Affected versions

6.*

6.1.106-3~deb11u1
6.1.106-3~deb11u2
6.1.106-3~deb11u3
6.1.112-1~deb11u1
6.1.119-1~deb11u1
6.1.128-1~deb11u1
6.1.129-1~deb11u1
6.1.137-1~deb11u1
6.1.140-1~deb11u1
6.1.147-1~deb11u1
6.1.148-1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.14.2+25-gb6a8c4f72d-2
4.14.3-1~deb11u1
4.14.3-1
4.14.3+32-g9de3671772-1~deb11u1
4.14.3+32-g9de3671772-1
4.14.4+74-gd7b22226b5-1
4.14.5+24-g87d90d511c-1
4.14.5+86-g1c354767d5-1
4.14.5+94-ge49571868d-1
4.14.6-1
4.16.0-1~exp1
4.16.0+51-g0941d6cb-1
4.16.1-1
4.16.2-1
4.16.2-2
4.16.2+90-g0d39a6d1ae-1
4.17.0~rc4-1~exp1
4.17.0-1
4.17.0+24-g2f8851c37f-2~exp1
4.17.0+24-g2f8851c37f-2
4.17.0+46-gaaf74a532c-1
4.17.0+74-g3eac216e6e-1
4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.17.5+72-g01140da4e8-1
4.19.0+14-g0918434e0f-1~exp1
4.19.1-1~exp1
4.19.1-1~exp4
4.19.1-1
4.20.0~rc2+1-gfcde5e0de8-1~exp1
4.20.0-1
4.20.0+68-g35cb38b222-1
4.20.2+7-g1badcf5035-1
4.20.2+7-g1badcf5035-2

Ecosystem specific

{
    "urgency": "end-of-life"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

Debian:12

amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1
3.20230719.1~deb12u1
3.20230719.1
3.20230808.1
3.20230808.1.1~deb11u1
3.20230808.1.1~deb12u1
3.20230808.1.1
3.20230823.1
3.20231019.1
3.20240116.2
3.20240116.2+nmu1
3.20240710.1
3.20240710.2~deb11u1
3.20240710.2~deb12u1
3.20240710.2
3.20240820.1~deb11u1
3.20240820.1~deb12u1
3.20240820.1
3.20250311.1~deb11u1
3.20250311.1~deb12u1
3.20250311.1
3.20251202.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.147-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1
6.1.90-1
6.1.94-1~bpo11+1
6.1.94-1
6.1.98-1
6.1.99-1
6.1.106-1
6.1.106-2
6.1.106-3
6.1.112-1
6.1.115-1
6.1.119-1
6.1.123-1
6.1.124-1
6.1.128-1
6.1.129-1
6.1.133-1
6.1.135-1
6.1.137-1
6.1.139-1
6.1.140-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.5+72-g01140da4e8-1

Affected versions

4.*

4.17.1+2-gb773c48e36-1
4.17.2-1
4.17.2+55-g0b56bed864-1
4.17.2+76-ge1f9cb16e2-1~deb12u1
4.17.2+76-ge1f9cb16e2-1
4.17.3+10-g091466ba55-1~deb12u1
4.17.3+10-g091466ba55-1
4.17.3+10-g091466ba55-1.1~exp1
4.17.3+10-g091466ba55-1.1~exp2
4.17.3+10-g091466ba55-1.1
4.17.3+36-g54dacb5c02-1
4.17.5+23-ga4e5191dc0-1
4.17.5+23-ga4e5191dc0-1+deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

Debian:13

amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1
3.20230719.1~deb12u1
3.20230719.1
3.20230808.1
3.20230808.1.1~deb11u1
3.20230808.1.1~deb12u1
3.20230808.1.1
3.20230823.1
3.20231019.1
3.20240116.2
3.20240116.2+nmu1
3.20240710.1
3.20240710.2~deb11u1
3.20240710.2~deb12u1
3.20240710.2
3.20240820.1~deb11u1
3.20240820.1~deb12u1
3.20240820.1
3.20250311.1~deb11u1
3.20250311.1~deb12u1
3.20250311.1
3.20251202.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.37-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.20.2+7-g1badcf5035-0+deb13u1

Affected versions

4.*

4.20.0+68-g35cb38b222-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

Debian:14

amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.20251202.1

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1
3.20230719.1~deb12u1
3.20230719.1
3.20230808.1
3.20230808.1.1~deb11u1
3.20230808.1.1~deb12u1
3.20230808.1.1
3.20230823.1
3.20231019.1
3.20240116.2
3.20240116.2+nmu1
3.20240710.1
3.20240710.2~deb11u1
3.20240710.2~deb12u1
3.20240710.2
3.20240820.1~deb11u1
3.20240820.1~deb12u1
3.20240820.1
3.20250311.1~deb11u1
3.20250311.1~deb12u1
3.20250311.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.37-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"

xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.20.2+7-g1badcf5035-1

Affected versions

4.*

4.20.0+68-g35cb38b222-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36357.json"