{"id":"CVE-2023-28746","details":"Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","modified":"2026-04-16T04:35:43.899827300Z","published":"2024-03-14T17:15:50Z","related":["ALSA-2024:5101","ALSA-2024:8162","ALSA-2024:9401","SUSE-SU-2024:0856-1","SUSE-SU-2024:0857-1","SUSE-SU-2024:0858-1","SUSE-SU-2024:0900-1","SUSE-SU-2024:0900-2","SUSE-SU-2024:0910-1","SUSE-SU-2024:0917-1","SUSE-SU-2024:0925-1","SUSE-SU-2024:0926-1","SUSE-SU-2024:0975-1","SUSE-SU-2024:0976-1","SUSE-SU-2024:0977-1","SUSE-SU-2024:1101-1","SUSE-SU-2024:1102-1","SUSE-SU-2024:1105-1","SUSE-SU-2024:1139-1","SUSE-SU-2024:1152-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1454-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1489-1","SUSE-SU-2024:1490-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1669-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:2535-1","SUSE-SU-2025:1032-1","SUSE-SU-2025:20020-1","openSUSE-SU-2024:13769-1","openSUSE-SU-2024:13785-1","openSUSE-SU-2024:13801-1","openSUSE-SU-2025:14705-1"],"references":[{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-452.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/03/12/13"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"}],"schema_version":"1.7.5"}