2.1
CVSSv2

CVE-2021-26313

Published: 09/06/2021 Updated: 01/08/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen

arm cortex-a72 -

broadcom bcm2711 -

intel core i7-7700k -

intel xeon silver 4214 -

intel core i9-9900k -

intel core i7-10700k -

debian debian linux 10.0

Vendor Advisories

Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service or information leaks For the stable distribution (buster), these problems have been fixed in version 4114+107-gef32c7afa2-1 We recommend that you upgrade your xen packages For the detailed security status of xen please refer to its secu ...
Several security issues have been identified that affect Citrix Hypervisor:Two issues, each of which may each allow privileged code in a guest VM to cause the host to crash or become unresponsive  These two issues only affect systems where the malicious guest VM has a physical PCI device passed through to it by the host administratorThese is ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass <!--X-Subject-Header-End--> <! ...