CVE-2021-26313

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

01 Aug 2022, 12:41

Type Values Removed Values Added
CWE CWE-668 CWE-203

13 Oct 2021, 19:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/10', 'name': '[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/09/2', 'name': '[oss-security] 20210609 Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/', 'name': 'FEDORA-2021-41d4347447', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/1', 'name': '[oss-security] 20210610 Xen Security Advisory 375 v4 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://www.debian.org/security/2021/dsa-4931', 'name': 'DSA-4931', 'tags': ['Third Party Advisory'], 'refsource': 'DEBIAN'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/', 'name': 'FEDORA-2021-993693c914', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'http://xenbits.xen.org/xsa/advisory-375.html', 'name': 'http://xenbits.xen.org/xsa/advisory-375.html', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/11', 'name': '[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}

17 Jun 2021, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ -

16 Jun 2021, 23:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ -

16 Jun 2021, 15:56

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2021/dsa-4931 - (DEBIAN) https://www.debian.org/security/2021/dsa-4931 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 - Mailing List, Third Party Advisory
References (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html - (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html - Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
CPE cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*
cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*
CWE CWE-668

16 Jun 2021, 13:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4931 -

10 Jun 2021, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/11 -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/10 -

10 Jun 2021, 12:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/10/1 -

09 Jun 2021, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/09/2 -
  • (CONFIRM) http://xenbits.xen.org/xsa/advisory-375.html -

09 Jun 2021, 12:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 12:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-26313

Mitre link : CVE-2021-26313

CVE.ORG link : CVE-2021-26313


JSON object : View

Products Affected

intel

  • core_i7-10700k
  • xeon_silver_4214
  • core_i9-9900k
  • core_i7-7700k

xen

  • xen

amd

  • ryzen_7_2700x
  • ryzen_threadripper_2990wx
  • ryzen_5_5600x

broadcom

  • bcm2711

debian

  • debian_linux

arm

  • cortex-a72
CWE
CWE-203

Observable Discrepancy

CWE-208

Observable Timing Discrepancy