vulnerability
Amazon Linux AMI 2: CVE-2023-20593: Security patch for kernel, linux-firmware (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:C/I:N/A:N) | Jul 24, 2023 | Aug 9, 2023 | Feb 20, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
Jul 24, 2023
Added
Aug 9, 2023
Modified
Feb 20, 2025
Description
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Solution(s)
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-iwl100-firmwareamazon-linux-ami-2-upgrade-iwl1000-firmwareamazon-linux-ami-2-upgrade-iwl105-firmwareamazon-linux-ami-2-upgrade-iwl135-firmwareamazon-linux-ami-2-upgrade-iwl2000-firmwareamazon-linux-ami-2-upgrade-iwl2030-firmwareamazon-linux-ami-2-upgrade-iwl3160-firmwareamazon-linux-ami-2-upgrade-iwl3945-firmwareamazon-linux-ami-2-upgrade-iwl4965-firmwareamazon-linux-ami-2-upgrade-iwl5000-firmwareamazon-linux-ami-2-upgrade-iwl5150-firmwareamazon-linux-ami-2-upgrade-iwl6000-firmwareamazon-linux-ami-2-upgrade-iwl6000g2a-firmwareamazon-linux-ami-2-upgrade-iwl6000g2b-firmwareamazon-linux-ami-2-upgrade-iwl6050-firmwareamazon-linux-ami-2-upgrade-iwl7260-firmwareamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-5-15-122-77-145amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-linux-firmwareamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.