Improper enforcement of the LFENCE serialization property may allow an attacker to bypass speculation barriers and potentially disclose sensitive information, potentially resulting in loss of confidentiality.
Problem type
Affected products
AMD
GenoaPI_1.0.0.E - UNAFFECTED
ComboAM5PI_1.0.0.a/ ComboAM5PI_1.1.0.3c/ ComboAM5PI_1.2.0.3 - UNAFFECTED
GenoaPI_1.0.0.E - UNAFFECTED
MI300PI 1.0.0.7 - UNAFFECTED
ComboAM5PI_1.2.0.3 - UNAFFECTED
ComboAM5PI_1.1.0.3c - UNAFFECTED
ComboAM5PI_1.0.0.a - UNAFFECTED
PhoenixPI-FP8-FP7_1.2.0.0 - UNAFFECTED
DragonRangeFL1_1.0.0.3g - UNAFFECTED
ComboAM5PI_1.2.0.3 - UNAFFECTED
ComboAM5PI_1.0.0.a - UNAFFECTED
ComboAM5PI_1.1.0.3c - UNAFFECTED
ComboAM5PI_1.2.0.3 - UNAFFECTED
ComboAM5PI_1.1.0.3c - UNAFFECTED
ComboAM5PI_1.2.0.3 - UNAFFECTED
ComboAM5PI_1.3.0.0 - UNAFFECTED
ComboAM5PI_1.3.0.0 - UNAFFECTED
EmbGenoaPI-SP5 1.0.0.D - UNAFFECTED
EmbGenoaPI-SP5 1.0.0.D - UNAFFECTED
EmbGenoaPI-SP5 1.0.0.D - UNAFFECTED
EmbeddedPhoenixPI-FP7r2_1.0.0.3 - UNAFFECTED
EmbeddedAM5PI 1.0.0.5 - UNAFFECTED
References
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3030.html
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4017.html
JSON source
https://cveawg.mitre.org/api/cve/CVE-2024-36315Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2024-36315",
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"dateUpdated": "2026-05-13T03:08:31.800Z",
"dateReserved": "2024-05-23T19:44:32.297Z",
"datePublished": "2026-05-13T03:07:34.076Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD",
"dateUpdated": "2026-05-13T03:08:31.800Z"
},
"datePublic": "2026-05-13T03:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Improper enforcement of the LFENCE serialization property may allow an attacker to bypass speculation barriers and potentially disclose sensitive information, potentially resulting in loss of confidentiality.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Improper enforcement of the LFENCE serialization property may allow an attacker to bypass speculation barriers and potentially disclose sensitive information, potentially resulting in loss of confidentiality. <br>"
}
]
}
],
"affected": [
{
"vendor": "AMD",
"product": "AMD EPYC™ Series 9004 Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "GenoaPI_1.0.0.E",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD EPYC™Series 4004 Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.0.0.a/ ComboAM5PI_1.1.0.3c/ ComboAM5PI_1.2.0.3",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD EPYC™ 8004 Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "GenoaPI_1.0.0.E",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Instinct™ MI300A Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "MI300PI 1.0.0.7",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ Z1 Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.2.0.3",
"status": "unaffected"
},
{
"version": "ComboAM5PI_1.1.0.3c",
"status": "unaffected"
},
{
"version": "ComboAM5PI_1.0.0.a",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics",
"defaultStatus": "affected",
"versions": [
{
"version": "PhoenixPI-FP8-FP7_1.2.0.0",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics",
"defaultStatus": "affected",
"versions": [
{
"version": "DragonRangeFL1_1.0.0.3g",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 9000 Series Desktop Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.2.0.3",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 7000 Series Desktop Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.0.0.a",
"status": "unaffected"
},
{
"version": "ComboAM5PI_1.1.0.3c",
"status": "unaffected"
},
{
"version": "ComboAM5PI_1.2.0.3",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 8000 Series Desktop Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.1.0.3c",
"status": "unaffected"
},
{
"version": "ComboAM5PI_1.2.0.3",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed \"Raphael\")",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.3.0.0",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed \"Phoenix\")",
"defaultStatus": "affected",
"versions": [
{
"version": "ComboAM5PI_1.3.0.0",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed \"Genoa\")",
"defaultStatus": "affected",
"versions": [
{
"version": "EmbGenoaPI-SP5 1.0.0.D",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD EPYC™ Embedded 8004 Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "EmbGenoaPI-SP5 1.0.0.D",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed \"Bergamo\")",
"defaultStatus": "affected",
"versions": [
{
"version": "EmbGenoaPI-SP5 1.0.0.D",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ Embedded 8000 Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "EmbeddedPhoenixPI-FP7r2_1.0.0.3",
"status": "unaffected"
}
]
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ Embedded 7000 Series Processors",
"defaultStatus": "affected",
"versions": [
{
"version": "EmbeddedAM5PI 1.0.0.5",
"status": "unaffected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-693 Protection Mechanism Failure",
"cweId": "CWE-693",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3030.html"
},
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4017.html"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
]
}
}
}