Description

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 







Published: 2023-08-08
Score: 5.5 Medium
EPSS: 7.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3623-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5480-1 linux security update
Debian DSA Debian DSA DSA-5492-1 linux security update
Ubuntu USN Ubuntu USN USN-6383-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6384-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6386-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6386-2 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6386-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6387-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6387-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6466-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6577-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-6602-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6604-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6604-2 Linux kernel (Azure) vulnerabilities
References
Link Providers
http://www.openwall.com/lists/oss-security/2023/09/25/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/26/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/27/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/12 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/13 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/14 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/15 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/16 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/03/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/10/04/4 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-439.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-20588 cve-icon
https://security.netapp.com/advisory/ntap-20240531-0005/ cve-icon cve-icon
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007 cve-icon cve-icon
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-20588 cve-icon
https://www.debian.org/security/2023/dsa-5480 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5492 cve-icon cve-icon
History

Thu, 17 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Amd Athlon Gold 3150g Athlon Gold 3150g Firmware Athlon Gold 3150ge Athlon Gold 3150ge Firmware Athlon Gold Pro 3150g Athlon Gold Pro 3150g Firmware Athlon Gold Pro 3150ge Athlon Gold Pro 3150ge Firmware Athlon Pro 300ge Athlon Pro 300ge Firmware Athlon Silver 3050ge Athlon Silver 3050ge Firmware Athlon Silver Pro 3125ge Athlon Silver Pro 3125ge Firmware Epyc 7251 Epyc 7251 Firmware Epyc 7261 Epyc 7261 Firmware Epyc 7281 Epyc 7281 Firmware Epyc 7301 Epyc 7301 Firmware Epyc 7351 Epyc 7351 Firmware Epyc 7351p Epyc 7351p Firmware Epyc 7371 Epyc 7371 Firmware Epyc 7401 Epyc 7401 Firmware Epyc 7401p Epyc 7401p Firmware Epyc 7451 Epyc 7451 Firmware Epyc 7501 Epyc 7501 Firmware Epyc 7551 Epyc 7551 Firmware Epyc 7551p Epyc 7551p Firmware Epyc 7571 Epyc 7571 Firmware Epyc 7601 Epyc 7601 Firmware Ryzen 3 3200g Ryzen 3 3200g Firmware Ryzen 3 3200ge Ryzen 3 3200ge Firmware Ryzen 3 Pro 3200g Ryzen 3 Pro 3200g Firmware Ryzen 3 Pro 3200ge Ryzen 3 Pro 3200ge Firmware Ryzen 5 3400g Ryzen 5 3400g Firmware Ryzen 5 Pro 3350g Ryzen 5 Pro 3350g Firmware Ryzen 5 Pro 3350ge Ryzen 5 Pro 3350ge Firmware Ryzen 5 Pro 3400g Ryzen 5 Pro 3400g Firmware Ryzen 5 Pro 3400ge Ryzen 5 Pro 3400ge Firmware
Debian Debian Linux
Fedoraproject Fedora
Microsoft Windows 10 1507 Windows 10 1607 Windows 10 1809 Windows 10 21h2 Windows 10 22h2 Windows 11 21h2 Windows 11 22h2 Windows 11 23h2 Windows Server 2008 Windows Server 2012 Windows Server 2016 Windows Server 2019 Windows Server 2022 23h2
Xen Xen
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2024-10-17T14:23:18.239Z

Reserved: 2022-10-27T18:53:39.759Z

Link: CVE-2023-20588

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.921Z

cve-icon NVD

Status : Modified

Published: 2023-08-08T18:15:11.653

Modified: 2024-11-21T07:41:10.450

Link: CVE-2023-20588

cve-icon Redhat

Severity : Low

Publid Date: 2023-08-08T18:08:00Z

Links: CVE-2023-20588 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses