An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
Link Providers
http://seclists.org/fulldisclosure/2023/Jul/43 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/24/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/12 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/13 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/14 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/15 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/16 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/17 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/26/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/31/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/11 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/7 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-433.html cve-icon cve-icon
https://cmpxchg8b.com/zenbleed.html cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98 cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/[email protected]/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-20593 cve-icon
https://security.netapp.com/advisory/ntap-20240531-0004/ cve-icon cve-icon
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008 cve-icon cve-icon
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-20593 cve-icon
https://www.debian.org/security/2023/dsa-5459 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5461 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5462 cve-icon cve-icon
History

Tue, 19 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2023-07-24T19:38:43.385Z

Updated: 2024-11-19T16:08:15.479Z

Reserved: 2022-10-27T18:53:39.762Z

Link: CVE-2023-20593

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:45.858Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T20:15:10.237

Modified: 2024-11-21T07:41:11.193

Link: CVE-2023-20593

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-25T06:30:00Z

Links: CVE-2023-20593 - Bugzilla