Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.2::nfv cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat rhel Eus
|
Thu, 08 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:48:50.793Z
Reserved: 2023-05-05T03:00:03.623Z
Link: CVE-2023-28746

Updated: 2024-08-02T13:51:38.519Z

Status : Awaiting Analysis
Published: 2024-03-14T17:15:50.533
Modified: 2024-11-21T07:55:55.327
Link: CVE-2023-28746
