Unrated severityNVD Advisory· Published Aug 11, 2023· Updated Feb 13, 2025
CVE-2023-23908
CVE-2023-23908
Description
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
Affected products
29- Intel/3rd Generation Xeon(R) Scalable processorsdescription
- osv-coords28 versionspkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%20Micro%205.4pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Tumbleweedpkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20COREpkg:rpm/suse/ucode-intel&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/ucode-intel&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/ucode-intel&distro=SUSE%20Manager%20Server%204.2
< 20230808-150200.27.1+ 27 more
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-1.1
- (no CPE)range: < 1.17-102.83.81.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150100.3.223.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-13.110.1
- (no CPE)range: < 20230808-123.1
- (no CPE)range: < 20230808-150100.3.223.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-123.1
- (no CPE)range: < 20230808-150100.3.223.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
- (no CPE)range: < 20230808-150200.27.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.htmlmitre
- lists.debian.org/debian-lts-announce/2023/08/msg00026.htmlmitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/mitre
- security.netapp.com/advisory/ntap-20230824-0003/mitre
- www.debian.org/security/2023/dsa-5474mitre
News mentions
0No linked articles in our index yet.