First published: Wed Oct 13 2021(Updated: )
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Athlon Firmware | ||
AMD Athlon | ||
Amd Athlon Pro Firmware | ||
AMD Athlon Pro | ||
Amd Epyc Firmware | ||
AMD EPYC | ||
Amd Ryzen Firmware | ||
AMD CPUs | ||
Amd Ryzen Pro Firmware | ||
Amd Ryzen Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26318 has been classified with a high severity due to its potential to leak sensitive kernel address space information.
To mitigate CVE-2021-26318, users should apply the latest firmware updates provided by AMD for their affected CPUs.
CVE-2021-26318 affects specific AMD firmware versions, particularly those associated with AMD Athlon, Athlon Pro, EPYC, and Ryzen.
CVE-2021-26318 exploits a timing and power-based side channel through x86 PREFETCH instructions, enabling potential information leakage.
Currently, the recommended workaround for CVE-2021-26318 is to ensure that all affected systems are promptly updated to the latest firmware versions.