{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-20569","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2022-10-27T18:53:39.754Z","datePublished":"2023-08-08T17:02:11.318Z","dateUpdated":"2024-09-23T03:18:32.598Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 3000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ PRO 3000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 3000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ PRO 3000 Series Processors with Radeon™ Vega Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Athlon™ 3000 Series Processors with Radeon™ Graphics ","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ PRO 4000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 5000 Series Desktop Processors ","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":"AGESA","platforms":["x86"],"product":"Ryzen™ PRO 5000 Series Desktop Processors","vendor":" ","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ Threadripper™ 2000 Series Processors ","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":" Ryzen™ Threadripper™ 5000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ Threadripper™ 3000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 5000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ PRO 5000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 6000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ PRO 6000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","packageName":" ","platforms":["x86"],"product":"Ryzen™ 7040 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":"Ryzen™ 7000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":"Ryzen™ 7000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":" 1st Gen AMD EPYC™ Processors","vendor":"AMD ","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":"2nd Gen AMD EPYC™ Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":"3rd Gen AMD EPYC™  Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]},{"defaultStatus":"affected","platforms":["x86"],"product":"4th Gen AMD EPYC™  Processors","vendor":"AMD","versions":[{"status":"affected","version":"various "}]}],"datePublic":"2023-08-08T16:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">A side channel vulnerability on some </span><span style=\"background-color: rgb(255, 255, 255);\">of the </span><span style=\"background-color: rgb(255, 255, 255);\">AMD CPUs may allow an attacker to influence </span><span style=\"background-color: rgb(255, 255, 255);\">the </span><span style=\"background-color: rgb(255, 255, 255);\">return address prediction</span><span style=\"background-color: rgb(255, 255, 255);\">. This may</span><span style=\"background-color: rgb(255, 255, 255);\"> result in speculative execution at an attacker-controlled </span><span style=\"background-color: rgb(255, 255, 255);\">address</span><span style=\"background-color: rgb(255, 255, 255);\">, potentially leading to information disclosure.</span>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"}],"value":"\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"}],"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2023-08-08T17:02:11.318Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005"},{"url":"http://xenbits.xen.org/xsa/advisory-434.html"},{"url":"http://www.openwall.com/lists/oss-security/2023/08/08/4"},{"url":"https://comsec.ethz.ch/research/microarch/inception/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"url":"https://www.debian.org/security/2023/dsa-5475"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"url":"https://security.netapp.com/advisory/ntap-20240605-0006/"}],"source":{"advisory":"AMD-SB-7005","discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-09-23T03:18:32.598Z"},"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html"},{"tags":["vendor-advisory","x_transferred"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005"},{"tags":["x_transferred"],"url":"http://xenbits.xen.org/xsa/advisory-434.html"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/08/08/4"},{"tags":["x_transferred"],"url":"https://comsec.ethz.ch/research/microarch/inception/"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/"},{"tags":["x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"tags":["x_transferred"],"url":"https://www.debian.org/security/2023/dsa-5475"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"tags":["x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20240605-0006/"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]},"dataVersion":"5.1"}