CVE-2021-26318
13.10.2021, 19:15
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.Enginsight
Vendor | Product | Version |
---|---|---|
amd | athlon_firmware | - |
amd | athlon_pro_firmware | - |
amd | epyc_firmware | - |
amd | ryzen_firmware | - |
amd | ryzen_pro_firmware | - |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
- CWE-208 - Observable Timing DiscrepancyTwo separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
- CWE-203 - Observable DiscrepancyThe product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.