Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.2::nfv cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat rhel Eus
|
Thu, 08 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
MITRE
Status: PUBLISHED
Assigner: intel
Published: 2024-03-14T16:45:50.370Z
Updated: 2024-08-02T13:51:38.519Z
Reserved: 2023-05-05T03:00:03.623Z
Link: CVE-2023-28746
Vulnrichment
Updated: 2024-08-02T13:51:38.519Z
NVD
Status : Awaiting Analysis
Published: 2024-03-14T17:15:50.533
Modified: 2024-11-21T07:55:55.327
Link: CVE-2023-28746
Redhat