Description
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Exploits (1)
References (35)
Core 35
Core References
Not Applicable
http://seclists.org/fulldisclosure/2023/Jul/43
Mailing List, Mitigation, Patch, Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/07/26/1
Mailing List, Mitigation, Patch, Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/07/31/2
Mitigation, Patch, Vendor Advisory
http://xenbits.xen.org/xsa/advisory-433.html
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
Third Party Advisory
https://www.debian.org/security/2023/dsa-5459
Third Party Advisory
https://www.debian.org/security/2023/dsa-5461
Third Party Advisory
https://www.debian.org/security/2023/dsa-5462
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20240531-0004/
Vendor Advisory vendor-advisory
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
Scores
CVSS v3
5.5
EPSS
0.0588
EPSS Percentile
90.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-209
Status
published
Products (50)
amd/athlon_gold_7220u_firmware
amd/epyc_7232p_firmware
amd/epyc_7252_firmware
amd/epyc_7262_firmware
amd/epyc_7272_firmware
amd/epyc_7282_firmware
amd/epyc_7302_firmware
amd/epyc_7302p_firmware
amd/epyc_7352_firmware
amd/epyc_7402_firmware
... and 40 more
Published
Jul 24, 2023
Tracked Since
Feb 18, 2026