A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
References
Link Providers
http://www.openwall.com/lists/oss-security/2023/09/25/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/27/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/12 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/13 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/14 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/15 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/16 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/4 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-439.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-20588 cve-icon
https://security.netapp.com/advisory/ntap-20240531-0005/ cve-icon cve-icon
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007 cve-icon cve-icon
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-20588 cve-icon
https://www.debian.org/security/2023/dsa-5480 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5492 cve-icon cve-icon
History

Thu, 17 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2023-08-08T17:06:30.065Z

Updated: 2024-10-17T14:23:18.239Z

Reserved: 2022-10-27T18:53:39.759Z

Link: CVE-2023-20588

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.921Z

cve-icon NVD

Status : Modified

Published: 2023-08-08T18:15:11.653

Modified: 2024-11-21T07:41:10.450

Link: CVE-2023-20588

cve-icon Redhat

Severity : Low

Publid Date: 2023-08-08T18:08:00Z

Links: CVE-2023-20588 - Bugzilla