CVE-2023-28746
Public on 2024-03-14
Modified on 2024-07-12
Description
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | No Fix Planned | ||
Amazon Linux 2 - Core | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.10 Extra | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.15 Extra | kernel | Pending Fix | ||
Amazon Linux 2 - Kernel-5.4 Extra | kernel | Pending Fix | ||
Amazon Linux 2023 | kernel | Pending Fix | ||
Amazon Linux 1 | microcode_ctl | No Fix Planned | ||
Amazon Linux 2 - Core | microcode_ctl | Pending Fix | ||
Amazon Linux 2023 | microcode_ctl | Pending Fix |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
NVD | CVSSv3 | 6.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |