CVE-2023-20593
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/07/2023
Última modificación:
13/02/2025
Descripción
*** Pendiente de traducción *** An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:xen:xen:4.14.0:*:*:*:*:*:x86:* | ||
cpe:2.3:o:xen:xen:4.15.0:*:*:*:*:*:x86:* | ||
cpe:2.3:o:xen:xen:4.16.0:*:*:*:*:*:x86:* | ||
cpe:2.3:o:xen:xen:4.17.0:*:*:*:*:*:x86:* | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/24/3
- http://www.openwall.com/lists/oss-security/2023/07/25/1
- http://www.openwall.com/lists/oss-security/2023/07/25/12
- http://www.openwall.com/lists/oss-security/2023/07/25/13
- http://www.openwall.com/lists/oss-security/2023/07/25/14
- http://www.openwall.com/lists/oss-security/2023/07/25/15
- http://www.openwall.com/lists/oss-security/2023/07/25/16
- http://www.openwall.com/lists/oss-security/2023/07/25/17
- http://www.openwall.com/lists/oss-security/2023/07/25/5
- http://www.openwall.com/lists/oss-security/2023/07/25/6
- http://www.openwall.com/lists/oss-security/2023/07/26/1
- http://www.openwall.com/lists/oss-security/2023/07/31/2
- http://www.openwall.com/lists/oss-security/2023/08/08/6
- http://www.openwall.com/lists/oss-security/2023/08/08/7
- http://www.openwall.com/lists/oss-security/2023/08/08/8
- http://www.openwall.com/lists/oss-security/2023/08/16/4
- http://www.openwall.com/lists/oss-security/2023/08/16/5
- http://www.openwall.com/lists/oss-security/2023/09/22/11
- http://www.openwall.com/lists/oss-security/2023/09/22/9
- http://www.openwall.com/lists/oss-security/2023/09/25/4
- http://www.openwall.com/lists/oss-security/2023/09/25/7
- http://xenbits.xen.org/xsa/advisory-433.html
- https://cmpxchg8b.com/zenbleed.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
- https://security.netapp.com/advisory/ntap-20240531-0004/
- https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
- https://www.debian.org/security/2023/dsa-5459
- https://www.debian.org/security/2023/dsa-5461
- https://www.debian.org/security/2023/dsa-5462
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/24/3
- http://www.openwall.com/lists/oss-security/2023/07/25/1
- http://www.openwall.com/lists/oss-security/2023/07/25/12
- http://www.openwall.com/lists/oss-security/2023/07/25/13
- http://www.openwall.com/lists/oss-security/2023/07/25/14
- http://www.openwall.com/lists/oss-security/2023/07/25/15
- http://www.openwall.com/lists/oss-security/2023/07/25/16
- http://www.openwall.com/lists/oss-security/2023/07/25/17
- http://www.openwall.com/lists/oss-security/2023/07/25/5
- http://www.openwall.com/lists/oss-security/2023/07/25/6
- http://www.openwall.com/lists/oss-security/2023/07/26/1
- http://www.openwall.com/lists/oss-security/2023/07/31/2
- http://www.openwall.com/lists/oss-security/2023/08/08/6
- http://www.openwall.com/lists/oss-security/2023/08/08/7
- http://www.openwall.com/lists/oss-security/2023/08/08/8
- http://www.openwall.com/lists/oss-security/2023/08/16/4
- http://www.openwall.com/lists/oss-security/2023/08/16/5
- http://www.openwall.com/lists/oss-security/2023/09/22/11
- http://www.openwall.com/lists/oss-security/2023/09/22/9
- http://www.openwall.com/lists/oss-security/2023/09/25/4
- http://www.openwall.com/lists/oss-security/2023/09/25/7
- http://xenbits.xen.org/xsa/advisory-433.html
- https://cmpxchg8b.com/zenbleed.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
- https://security.netapp.com/advisory/ntap-20240531-0004/
- https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
- https://www.debian.org/security/2023/dsa-5459
- https://www.debian.org/security/2023/dsa-5461
- https://www.debian.org/security/2023/dsa-5462