5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
19.8%
Potential speculative code store bypass in all supported CPU products, in
conjunction with software vulnerabilities relating to speculative execution
of overwritten instructions, may cause an incorrect speculation and could
result in data leakage.
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |
www.openwall.com/lists/oss-security/2021/06/09/2
www.openwall.com/lists/oss-security/2021/06/10/1
www.openwall.com/lists/oss-security/2021/06/10/10
www.openwall.com/lists/oss-security/2021/06/10/11
xenbits.xen.org/xsa/advisory-375.html
launchpad.net/bugs/cve/CVE-2021-26313
nvd.nist.gov/vuln/detail/CVE-2021-26313
security-tracker.debian.org/tracker/CVE-2021-26313
www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003
www.cve.org/CVERecord?id=CVE-2021-26313
xenbits.xen.org/xsa/advisory-375.html
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
19.8%