CVE-2021-26313

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory

01 Aug 2022, 12:41

Type Values Removed Values Added
CWE CWE-668 CWE-203

13 Oct 2021, 19:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/10', 'name': '[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'http://xenbits.xen.org/xsa/advisory-375.html', 'name': 'http://xenbits.xen.org/xsa/advisory-375.html', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/1', 'name': '[oss-security] 20210610 Xen Security Advisory 375 v4 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/11', 'name': '[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/09/2', 'name': '[oss-security] 20210609 Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://www.debian.org/security/2021/dsa-4931', 'name': 'DSA-4931', 'tags': ['Third Party Advisory'], 'refsource': 'DEBIAN'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/', 'name': 'FEDORA-2021-993693c914', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/', 'name': 'FEDORA-2021-41d4347447', 'tags': [], 'refsource': 'FEDORA'}

17 Jun 2021, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ -

16 Jun 2021, 23:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ -

16 Jun 2021, 15:56

Type Values Removed Values Added
CWE CWE-668
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 - Mailing List, Third Party Advisory
References (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html - (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html - Patch, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-4931 - (DEBIAN) https://www.debian.org/security/2021/dsa-4931 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 - Mailing List, Third Party Advisory
CPE cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5

16 Jun 2021, 13:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4931 -

10 Jun 2021, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 -

10 Jun 2021, 12:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 -

09 Jun 2021, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 -
  • (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html -

09 Jun 2021, 12:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 12:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26313

Mitre link : CVE-2021-26313

CVE.ORG link : CVE-2021-26313


JSON object : View

Products Affected

amd

  • ryzen_7_2700x
  • ryzen_5_5600x
  • ryzen_threadripper_2990wx

arm

  • cortex-a72

xen

  • xen

intel

  • xeon_silver_4214
  • core_i7-10700k
  • core_i9-9900k
  • core_i7-7700k

debian

  • debian_linux

broadcom

  • bcm2711
CWE
CWE-208

Observable Timing Discrepancy

CWE-203

Observable Discrepancy