2021-01-29 22:00:41 +00:00
{
"CVE_data_meta" : {
2021-06-09 12:00:54 +00:00
"ASSIGNER" : "psirt@amd.com" ,
"DATE_PUBLIC" : "2021-06-08T19:30:00.000Z" ,
2021-01-29 22:00:41 +00:00
"ID" : "CVE-2021-26313" ,
2021-06-09 12:00:54 +00:00
"STATE" : "PUBLIC" ,
"TITLE" : "AMD Speculative Code Store Bypass"
2021-01-29 22:00:41 +00:00
} ,
2021-06-09 12:00:54 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "All supported processors" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : " "
}
]
}
}
]
} ,
"vendor_name" : "AMD"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-01-29 22:00:41 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-06-09 12:00:54 +00:00
"value" : "Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage."
2021-01-29 22:00:41 +00:00
}
]
2021-06-09 12:00:54 +00:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-208 Information Exposure Through Timing Discrepancy"
}
]
}
]
} ,
"references" : {
"reference_data" : [
2021-06-09 19:00:49 +00:00
{
"refsource" : "CONFIRM" ,
"name" : "http://xenbits.xen.org/xsa/advisory-375.html" ,
"url" : "http://xenbits.xen.org/xsa/advisory-375.html"
} ,
2021-06-09 12:00:54 +00:00
{
"refsource" : "MISC" ,
"url" : "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003" ,
"name" : "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003"
2021-06-09 18:00:55 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210609 Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/06/09/2"
2021-06-10 12:00:57 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210610 Xen Security Advisory 375 v4 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/06/10/1"
2021-06-10 15:00:56 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/06/10/10"
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20210610 Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass" ,
"url" : "http://www.openwall.com/lists/oss-security/2021/06/10/11"
2021-06-16 13:00:49 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4931" ,
"url" : "https://www.debian.org/security/2021/dsa-4931"
2021-06-16 23:00:55 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2021-41d4347447" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H36U6CNREC436W6GYO7QUMJIVEA35SCV/"
2021-06-17 03:00:47 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2021-993693c914" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVA2NY26MMXOODUMYZN5DCU3FXMBMBOB/"
2021-07-12 05:00:48 +00:00
} ,
{
"refsource" : "GENTOO" ,
"name" : "GLSA-202107-30" ,
"url" : "https://security.gentoo.org/glsa/202107-30"
2021-06-09 12:00:54 +00:00
}
]
} ,
"source" : {
"advisory" : "AMD-SB-1003" ,
"discovery" : "EXTERNAL"
2021-01-29 22:00:41 +00:00
}
}