CVE-2021-26313

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory

Information

Published : 2021-06-09 12:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26313

Mitre link : CVE-2021-26313

CVE.ORG link : CVE-2021-26313


JSON object : View

Products Affected

intel

  • core_i9-9900k
  • xeon_silver_4214
  • core_i7-7700k
  • core_i7-10700k

amd

  • ryzen_5_5600x
  • ryzen_threadripper_2990wx
  • ryzen_7_2700x

broadcom

  • bcm2711

xen

  • xen

debian

  • debian_linux

arm

  • cortex-a72
CWE
CWE-208

Observable Timing Discrepancy

CWE-203

Observable Discrepancy