CVE-2023-20593

NameCVE-2023-20593
Description An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3508-1, DLA-3511-1, DLA-3512-1, DSA-5459-1, DSA-5461-1, DSA-5462-1, ELA-907-1, ELA-910-1, ELA-915-1
Debian Bugs1041863

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
amd64-microcode (PTS)jessie/non-free3.20230719.1~deb8u1fixed
jessie/non-free (lts)3.20181128.1~deb8u1vulnerable
stretch/non-free3.20230719.1~deb9u1fixed
stretch/non-free (security), stretch/non-free (lts)3.20181128.1~deb9u2vulnerable
buster/non-free (security), buster/non-free3.20230719.1~deb10u1fixed
bullseye/non-free3.20240820.1~deb11u1fixed
bullseye/non-free (security)3.20230719.1~deb11u1fixed
bookworm/non-free-firmware3.20240820.1~deb12u1fixed
bookworm/non-free-firmware (security)3.20230719.1~deb12u1fixed
sid/non-free-firmware, trixie/non-free-firmware3.20240820.1fixed
linux (PTS)jessie, jessie (lts)3.16.84-1vulnerable
stretch (security)4.9.320-2vulnerable
stretch (lts), stretch4.9.320-3vulnerable
buster (security), buster, buster (lts)4.19.316-1fixed
bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.115-1fixed
bookworm (security)6.1.112-1fixed
trixie6.11.7-1fixed
sid6.11.9-1fixed
linux-4.19 (PTS)jessie, jessie (lts)4.19.316-1~deb8u1fixed
stretch (security)4.19.232-1~deb9u1vulnerable
stretch (lts), stretch4.19.316-1~deb9u1fixed
linux-5.10 (PTS)stretch (lts), stretch5.10.226-1~deb9u1fixed
buster, buster (lts)5.10.226-1~deb10u1fixed
buster (security)5.10.218-1~deb10u1fixed
xen (PTS)jessie, jessie (lts)4.4.4lts5-0+deb8u1vulnerable
stretch (security), stretch (lts), stretch4.8.5.final+shim4.10.4-1+deb9u12vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
amd64-microcodesourcejessie3.20230719.1~deb8u1ELA-910-1
amd64-microcodesourcestretch3.20230719.1~deb9u1ELA-910-1
amd64-microcodesourcebuster3.20230719.1~deb10u1DLA-3511-1
amd64-microcodesourcebullseye3.20230719.1~deb11u1DSA-5459-1
amd64-microcodesourcebookworm3.20230719.1~deb12u1DSA-5459-1
amd64-microcodesource(unstable)3.20230719.11041863
linuxsourcejessie(unfixed)end-of-life
linuxsourcestretch(unfixed)end-of-life
linuxsourcebuster4.19.289-1DLA-3508-1
linuxsourcebullseye5.10.179-3DSA-5461-1
linuxsourcebookworm6.1.38-2DSA-5462-1
linuxsource(unstable)6.4.4-2
linux-4.19sourcejessie4.19.289-1~deb8u1ELA-907-1
linux-4.19sourcestretch4.19.289-1~deb9u1ELA-907-1
linux-5.10sourcestretch5.10.179-3~deb9u1ELA-915-1
linux-5.10sourcebuster5.10.179-3~deb10u1DLA-3512-1
xensourcejessie(unfixed)end-of-life
xensourcestretch(unfixed)end-of-life

Notes

https://www.openwall.com/lists/oss-security/2023/07/24/1
https://lock.cmpxchg8b.com/zenbleed.html
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8
https://xenbits.xen.org/xsa/advisory-433.html
Technically not an issue in src:linux but track as well the kernel side mitigation
under the CVE entry.
3.20230719.1 ships the first batch of fixes, only for 2nd gen Epyc CPUs, further
CPUs to follow in later releases

Search for package or bug name: Reporting problems