Special Register Buffer Data Sampling (Intel CPU exploit)

By: anonymous2 (anonymous2.delete@this.example.com), June 9, 2020 10:55 am
Room: Moderated Discussions
https://access.redhat.com/security/cve/CVE-2020-0543

"A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU."

Searching about it looks like some motherboard vendors released BIOS updates for this a couple of weeks ago.
 Next Post in Thread >
TopicPosted ByDate
Special Register Buffer Data Sampling (Intel CPU exploit)anonymous22020/06/09 10:55 AM
  Special Register Buffer Data Sampling (Intel CPU exploit)Adrian2020/06/09 11:49 AM
    Special Register Buffer Data Sampling (Intel CPU exploit)Adrian2020/06/09 11:51 AM
      InterestingChester2020/06/09 05:19 PM
        InterestingDavid Kanter2020/06/09 06:41 PM
        InterestingTravis Downs2020/06/09 08:44 PM
  ARM Straight-line SpeculationAdrian2020/06/11 06:36 AM
    ARM Straight-line SpeculationDoug S2020/06/11 10:57 AM
      ARM Straight-line SpeculationLinus Torvalds2020/06/11 12:17 PM
Reply to this Topic
Name:
Email:
Topic:
Body: No Text
How do you spell purple?