bleepingcomputer[.]com/news/security/zenbleed-attack-leaks-sensitive-data-from-amd-zen2-processors/
1st off this is not terribly dangerous...
Zenbleed's practical impact on regular users is relatively low, as it requires local access to the target system and a high degree of specialization and knowledge to exploit.
But it is a vulnerability and it has been patched by AMD with new micro code, so if you're running a CPU with Zen 2 you might want to check the PC / laptop / motherboard manufacturer's site for BIOS updates.
Google's security researcher Tavis Ormandy discovered a new vulnerability impacting AMD Zen2 CPUs that could allow a malicious actor to steal sensitive data, such as passwords and encryption keys, at a rate of 30KB/sec from each CPU core.The vulnerability is tracked as CVE-2023-20593 and is caused by the improper handling of an instruction called 'vzeroupper' during speculative execution, a common performance-enhancing technique used in all modern processors.