### [CVE-2021-26339](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26339) ![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%20Series&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=EPYC%E2%84%A2%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Series&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=various%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=tbd&color=brightgreen) ### Description A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers. ### POC #### Reference - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028 #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ep-infosec/50_google_silifuzz - https://github.com/google/silifuzz - https://github.com/suddenabnormalsecrets/silifuzz