Lucene search

K

CVE-2021-26312

πŸ—“οΈΒ 16 Nov 2021Β 18:07:15Reported byΒ AMDTypeΒ 
cve
Β cve
πŸ”—Β web.nvd.nist.govπŸ‘Β 47Β Views

Failure to flush TLB of IOMMU can lead to unauthorized memory access

Show more
Related
Detection
Affected
Refs
ReporterTitlePublishedViews
Family
Cvelist
CVE-2021-26312
16 Nov 202117:55
–cvelist
NVD
CVE-2021-26312
16 Nov 202118:15
–nvd
Prion
Design/Logic Flaw
16 Nov 202118:15
–prion
Amd
AMD Server Vulnerabilities - May 2022
10 May 202200:00
–amd
Amd
AMD Client Vulnerabilities – May 2022
10 May 202200:00
–amd
Amd
AMD Server Vulnerabilities – November 2021
8 Nov 202100:00
–amd
OpenVAS
openSUSE: Security Advisory for kernel-firmware (SUSE-SU-2022:1840-1)
26 May 202200:00
–openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2022:1840-1)
26 May 202200:00
–openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2022:1846-1)
26 May 202200:00
–openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2022:1847-1)
26 May 202200:00
–openvas
Rows per page
Nvd
Node
amdepyc_7601_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7501_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7451_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7371_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7301_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7281_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7261_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7251_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7f72_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7h12_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
[
  {
    "product": "EPYCβ„’ Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  },
  {
    "product": "Ryzenβ„’ Series",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  },
  {
    "product": "Athlonβ„’ Series",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Nov 2021 18:15Current
5.8Medium risk
Vulners AI Score5.8
CVSS22.1
CVSS35.5
EPSS0.0004
47
.json
Report