An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
Link Providers
http://seclists.org/fulldisclosure/2023/Jul/43 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/24/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/12 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/13 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/14 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/15 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/16 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/17 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/26/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/31/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/11 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/7 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-433.html cve-icon cve-icon
https://cmpxchg8b.com/zenbleed.html cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98 cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-20593 cve-icon
https://security.netapp.com/advisory/ntap-20240531-0004/ cve-icon cve-icon
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008 cve-icon cve-icon
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-20593 cve-icon
https://www.debian.org/security/2023/dsa-5459 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5461 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5462 cve-icon cve-icon
History

Thu, 13 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

Tue, 19 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-02-13T16:39:49.154Z

Reserved: 2022-10-27T18:53:39.762Z

Link: CVE-2023-20593

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:45.858Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T20:15:10.237

Modified: 2025-02-13T17:16:01.713

Link: CVE-2023-20593

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-25T06:30:00Z

Links: CVE-2023-20593 - Bugzilla