Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/06/09/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/06/10/1 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/ | |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-06-09 12:15
Updated : 2023-11-07 03:31
NVD link : CVE-2021-26314
Mitre link : CVE-2021-26314
CVE.ORG link : CVE-2021-26314
JSON object : View
Products Affected
xen
- xen
amd
- ryzen_threadripper_2990wx
- ryzen_7_2700x
- ryzen_5_5600x
intel
- xeon_silver_4214
- core_i7-10700k
- core_i9-9900k
- core_i7-7700k
arm
- cortex-a72
fedoraproject
- fedora
broadcom
- bcm2711