CVE-2023-28746

Name
CVE-2023-28746
Description
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
secure@intel.com https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
secure@intel.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
secure@intel.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
secure@intel.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
secure@intel.com http://www.openwall.com/lists/oss-security/2024/03/12/13
secure@intel.com https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

Match rules

CPE URI Source package Min version Max version
intel(r)-atom(r)-processors == See references == See references

Vulnerable and fixed packages

Source package Branch Version Maintainer Status