CVE-2023-20592

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-20592
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-20592.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-20592
Related
Published
2023-11-14T19:15:16Z
Modified
2024-09-11T04:57:12.200415Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.

References

Affected packages

Debian:11 / amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.20230719.1~deb11u1

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.20230719.1~deb12u1

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / amd64-microcode

Package

Name
amd64-microcode
Purl
pkg:deb/debian/amd64-microcode?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.20230719.1

Affected versions

0.*

0.20120117-1

1.*

1.20120117-1
1.20120117-2~bpo60+1
1.20120117-2
1.20120910-1~bpo60+1
1.20120910-1
1.20120910-2~bpo60+1
1.20120910-2
1.20120910-3
1.20141028.1
1.20160316.1

2.*

2.20120910-1~bpo70+1
2.20120910-1
2.20131007.1
2.20131007.1+really20130710.1
2.20141028.1~bpo70+1
2.20141028.1
2.20160316.1~bpo70+1
2.20160316.1~deb8u1
2.20160316.1

3.*

3.20160316.1
3.20160316.2
3.20160316.3
3.20171205.1
3.20171205.2
3.20180515.1
3.20180524.1~bpo9+1
3.20180524.1
3.20181128.1~bpo9+1
3.20181128.1~deb8u1
3.20181128.1~deb9u1
3.20181128.1~deb9u2
3.20181128.1
3.20191021.1
3.20191218.1
3.20220411.1
3.20220411.2
3.20230414.1
3.20230719.1~deb10u1
3.20230719.1~deb11u1
3.20230719.1~deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}