Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/06/09/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/06/10/1 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
30 Jun 2023, 17:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 |
03 Jun 2022, 13:45
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* |
17 Jun 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2021, 15:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:* cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:* |
|
CWE | CWE-668 | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory |
10 Jun 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jun 2021, 12:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-09 12:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-26314
Mitre link : CVE-2021-26314
CVE.ORG link : CVE-2021-26314
JSON object : View
Products Affected
amd
- ryzen_7_2700x
- ryzen_5_5600x
- ryzen_threadripper_2990wx
intel
- core_i7-10700k
- core_i7-7700k
- xeon_silver_4214
- core_i9-9900k
broadcom
- bcm2711
xen
- xen
fedoraproject
- fedora
arm
- cortex-a72