CVE-2023-23583

Name
CVE-2023-23583
Description
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
http://www.openwall.com/lists/oss-security/2023/11/14/8
http://www.openwall.com/lists/oss-security/2023/11/14/6
http://www.openwall.com/lists/oss-security/2023/11/14/4
http://www.openwall.com/lists/oss-security/2023/11/14/5
http://www.openwall.com/lists/oss-security/2023/11/14/7
http://www.openwall.com/lists/oss-security/2023/11/14/9
https://security.netapp.com/advisory/ntap-20231116-0015/
https://www.debian.org/security/2023/dsa-5563
secure@intel.com https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:* core_i3-10100y_firmware == None == -

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
intel-ucode 3.16-main 20231114-r0 Marian Buschsieweke <marian.buschsieweke@ovgu.de> fixed
intel-ucode 3.15-main 20231114-r0 Marian Buschsieweke <marian.buschsieweke@ovgu.de> fixed