Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 | Vendor Advisory |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory |
Information
Published : 2021-06-09 12:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26313
Mitre link : CVE-2021-26313
CVE.ORG link : CVE-2021-26313
JSON object : View
Products Affected
intel
- core_i9-9900k
- xeon_silver_4214
- core_i7-7700k
- core_i7-10700k
amd
- ryzen_5_5600x
- ryzen_threadripper_2990wx
- ryzen_7_2700x
broadcom
- bcm2711
xen
- xen
debian
- debian_linux
arm
- cortex-a72