{"api_version":"1","generated_at":"2026-04-22T23:53:36+00:00","cve":"CVE-2023-3006","urls":{"html":"https://cve.report/CVE-2023-3006","api":"https://cve.report/api/cve/CVE-2023-3006.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3006","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3006"},"summary":{"title":"CVE-2023-3006","description":"A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-05-31 20:15:00","updated_at":"2023-06-08 02:38:00"},"problem_types":["CWE-212"],"metrics":[],"references":[{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8","name":"https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8","refsource":"MISC","tags":[],"title":"kernel/git/arm64/linux.git - AArch64 Linux kernel port","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3006","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3006","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3006","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-3006","qid":"181847","title":"Debian Security Update for linux (CVE-2023-3006)"},{"cve":"CVE-2023-3006","qid":"199997","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6548-1)"},{"cve":"CVE-2023-3006","qid":"199999","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6548-2)"},{"cve":"CVE-2023-3006","qid":"200006","title":"Ubuntu Security Notification for Linux kernel (Oracle) Vulnerabilities (USN-6548-3)"},{"cve":"CVE-2023-3006","qid":"200037","title":"Ubuntu Security Notification for Linux kernel (IoT) Vulnerabilities (USN-6548-5)"},{"cve":"CVE-2023-3006","qid":"200202","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6701-1)"},{"cve":"CVE-2023-3006","qid":"200209","title":"Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-6701-2)"},{"cve":"CVE-2023-3006","qid":"200222","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6701-3)"},{"cve":"CVE-2023-3006","qid":"200244","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-6701-4)"},{"cve":"CVE-2023-3006","qid":"379043","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)"},{"cve":"CVE-2023-3006","qid":"379435","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2024:0012)"},{"cve":"CVE-2023-3006","qid":"673372","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-2787)"},{"cve":"CVE-2023-3006","qid":"673970","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-2879)"},{"cve":"CVE-2023-3006","qid":"755851","title":"SUSE Enterprise Linux Security Update for the linux kernel (SUSE-SU-2023:2646-1)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-3006","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Kernel","version":{"version_data":[{"version_value":"Linux Kernel 6.1-rc1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-226"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8","url":"https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8"}]},"description":{"description_data":[{"lang":"eng","value":"A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible."}]}},"nvd":{"publishedDate":"2023-05-31 20:15:00","lastModifiedDate":"2023-06-08 02:38:00","problem_types":["CWE-212"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}