VAR-202311-1187
Vulnerability from variot - Updated: 2025-12-19 22:58Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity. AMD CPUs are a series of CPUs from AMD Inc.
AMD CPUs contain a misguided instruction vulnerability.
The following advisory data is extracted from:
https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0753.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
- Packet Storm Staff
==================================================================== Red Hat Security Advisory
Synopsis: Moderate: linux-firmware security update Advisory ID: RHSA-2024:0753-03 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2024:0753 Issue date: 2024-02-09 Revision: 03 CVE Names: CVE-2023-20592 ====================================================================
Summary:
An update for linux-firmware is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
- (RCVE-2023-20592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution:
https://access.redhat.com/articles/11258
CVEs:
CVE-2023-20592
References:
https://access.redhat.com/security/updates/classification/#moderate https://bugzilla.redhat.com/show_bug.cgi?id=2244590
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202311-1187",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "epyc 7402p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7f32",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7281",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7f52",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7601",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7282",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7h12",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7643p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7532",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 75f3",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 73f3",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7313p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7502p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7313",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7401p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 74f3",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7252",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7552",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7443",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7303",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7502",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7303p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7551",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7413",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7262",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7373x",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7351",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7542",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7302",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7473x",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7551p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7663",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 72f3",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7272",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7203p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7662",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7251",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7402",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7302p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7713p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7643",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7452",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7713",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7642",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7501",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7351p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7371",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7763",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7451",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7513",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7261",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7f72",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7453",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7443p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7343",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7702",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7203",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7401",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7742",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7001",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7773x",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7573x",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7352",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7663p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7543",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "epyc 7232p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7301",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7702p",
"scope": "eq",
"trust": 1.0,
"vendor": "amd",
"version": null
},
{
"model": "epyc 7543p",
"scope": "lt",
"trust": 1.0,
"vendor": "amd",
"version": "milanpi_1.0.0.c"
},
{
"model": "cpu",
"scope": null,
"trust": 0.6,
"vendor": "amd",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "177057"
},
{
"db": "PACKETSTORM",
"id": "177305"
},
{
"db": "PACKETSTORM",
"id": "177304"
}
],
"trust": 0.3
},
"cve": "CVE-2023-20592",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CNVD-2025-29751",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2023-20592",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2023-20592",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2025-29751",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity. AMD CPUs are a series of CPUs from AMD Inc. \n\nAMD CPUs contain a misguided instruction vulnerability. \n\nThe following advisory data is extracted from:\n\nhttps://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0753.json\n\nRed Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat\u0027s archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. \n\n- Packet Storm Staff\n\n\n\n\n====================================================================\nRed Hat Security Advisory\n\nSynopsis: Moderate: linux-firmware security update\nAdvisory ID: RHSA-2024:0753-03\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2024:0753\nIssue date: 2024-02-09\nRevision: 03\nCVE Names: CVE-2023-20592\n====================================================================\n\nSummary: \n\nAn update for linux-firmware is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. \n\n\n\n\nDescription:\n\nThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. \n\nSecurity Fix(es):\n\n* (RCVE-2023-20592)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. \n\n\nSolution:\n\nhttps://access.redhat.com/articles/11258\n\n\n\nCVEs:\n\nCVE-2023-20592\n\nReferences:\n\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2244590\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-20592"
},
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"db": "PACKETSTORM",
"id": "177057"
},
{
"db": "PACKETSTORM",
"id": "177305"
},
{
"db": "PACKETSTORM",
"id": "177304"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-20592",
"trust": 2.0
},
{
"db": "CNVD",
"id": "CNVD-2025-29751",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-20592",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "177057",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "177305",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "177304",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"db": "PACKETSTORM",
"id": "177057"
},
{
"db": "PACKETSTORM",
"id": "177305"
},
{
"db": "PACKETSTORM",
"id": "177304"
},
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"id": "VAR-202311-1187",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
}
]
},
"last_update_date": "2025-12-19T22:58:13.256000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for AMD CPU Instruction Misconception",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/777111"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/cispa/CacheWarp "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "VULMON",
"id": "CVE-2023-20592"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.1,
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-3005"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-20592"
},
{
"trust": 0.3,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244590"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.1,
"url": "https://github.com/cispa/cachewarp"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2024:0753"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0753.json"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2024:0979"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0979.json"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2024:0978"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0978.json"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"db": "PACKETSTORM",
"id": "177057"
},
{
"db": "PACKETSTORM",
"id": "177305"
},
{
"db": "PACKETSTORM",
"id": "177304"
},
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"db": "PACKETSTORM",
"id": "177057"
},
{
"db": "PACKETSTORM",
"id": "177305"
},
{
"db": "PACKETSTORM",
"id": "177304"
},
{
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-12-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"date": "2023-11-14T00:00:00",
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"date": "2024-02-09T16:35:56",
"db": "PACKETSTORM",
"id": "177057"
},
{
"date": "2024-02-27T14:57:53",
"db": "PACKETSTORM",
"id": "177305"
},
{
"date": "2024-02-27T14:57:45",
"db": "PACKETSTORM",
"id": "177304"
},
{
"date": "2023-11-14T19:15:16.030000",
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-12-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-29751"
},
{
"date": "2023-11-14T00:00:00",
"db": "VULMON",
"id": "CVE-2023-20592"
},
{
"date": "2023-11-28T18:04:11.733000",
"db": "NVD",
"id": "CVE-2023-20592"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AMD CPU Instruction Misconception",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-29751"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.