An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3508-1 linux security update
Debian DLA Debian DLA DLA-3511-1 amd64-microcode security update
Debian DLA Debian DLA DLA-3512-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5459-1 amd64-microcode security update
Debian DSA Debian DSA DSA-5461-1 linux security update
Debian DSA Debian DSA DSA-5462-1 linux security update
Ubuntu USN Ubuntu USN USN-6244-1 AMD Microcode vulnerability
Ubuntu USN Ubuntu USN USN-6315-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6316-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6317-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6318-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6321-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6324-1 Linux kernel (GKE) vulnerabilities
Ubuntu USN Ubuntu USN USN-6325-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6328-1 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6329-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6330-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-6331-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6332-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6342-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6342-2 Linux kernel (Azure)
Ubuntu USN Ubuntu USN USN-6346-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6348-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6357-1 Linux kernel (IBM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6385-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6397-1 Linux kernel (BlueField) vulnerabilities
Ubuntu USN Ubuntu USN USN-6532-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://seclists.org/fulldisclosure/2023/Jul/43 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/24/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/12 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/13 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/14 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/15 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/16 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/17 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/25/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/26/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/07/31/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/7 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/08/8 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/08/16/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/11 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/22/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2023/09/25/7 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-433.html cve-icon cve-icon
https://cmpxchg8b.com/zenbleed.html cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98 cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-20593 cve-icon
https://security.netapp.com/advisory/ntap-20240531-0004/ cve-icon cve-icon
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008 cve-icon cve-icon
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-20593 cve-icon
https://www.debian.org/security/2023/dsa-5459 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5461 cve-icon cve-icon
https://www.debian.org/security/2023/dsa-5462 cve-icon cve-icon
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.05876}

epss

{'score': 0.0632}


Thu, 13 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

Tue, 19 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-02-13T16:39:49.154Z

Reserved: 2022-10-27T18:53:39.762Z

Link: CVE-2023-20593

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:45.858Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T20:15:10.237

Modified: 2025-02-13T17:16:01.713

Link: CVE-2023-20593

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-25T06:30:00Z

Links: CVE-2023-20593 - Bugzilla

cve-icon OpenCVE Enrichment

No data.