Unrated severityNVD Advisory· Published May 11, 2022· Updated Sep 16, 2024
CVE-2021-26342
CVE-2021-26342
Description
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.
Affected products
32- osv-coords31 versionspkg:rpm/opensuse/kernel-firmware&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/kernel-firmware&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/kernel-firmware&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-firmware&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/kernel-firmware&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/kernel-firmware&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/kernel-firmware&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-firmware&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 20210208-150300.4.10.1+ 30 more
- (no CPE)range: < 20210208-150300.4.10.1
- (no CPE)range: < 20220509-150400.4.5.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20191118-150000.3.42.1
- (no CPE)range: < 20191118-150000.3.42.1
- (no CPE)range: < 20210208-150300.4.10.1
- (no CPE)range: < 20210208-150300.4.10.1
- (no CPE)range: < 20210208-150300.4.10.1
- (no CPE)range: < 20220509-150400.4.5.1
- (no CPE)range: < 20190618-5.25.2
- (no CPE)range: < 20190618-5.25.2
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20191118-150000.3.42.1
- (no CPE)range: < 20190618-5.25.2
- (no CPE)range: < 20190618-5.25.2
- (no CPE)range: < 20191118-150000.3.42.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20200107-150100.3.31.1
- (no CPE)range: < 20190618-5.25.2
- (no CPE)range: < 20190618-5.25.2
- AMD/EPYC™ Processorsv5Range: various
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.