Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/06/09/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/06/10/1 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2021-06-09 05:15
Updated : 2022-06-03 06:45
NVD link : CVE-2021-26314
Mitre link : CVE-2021-26314
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
xen
- xen
amd
- ryzen_threadripper_2990wx
- ryzen_7_2700x
- ryzen_5_5600x
broadcom
- bcm2711
intel
- core_i7-10700k
- xeon_silver_4214
- core_i9-9900k
- core_i7-7700k
arm
- cortex-a72
fedoraproject
- fedora