- Joined
- May 6, 2019
- Messages
- 12,595
- Points
- 113
Image: Intel
Intel has released a list of processors that are affected by a new vulnerability called special register buffer data sampling (SRBDS). Otherwise known as “crosstalk,” this is an execution attack that, as the company explains, “may allow data values from special registers to be inferred by malicious code executing on any core of the CPU.”
“On some processors, the data returned for a special register read is staged in a shared microarchitectural buffer and then transferred to the microarchitectural fill buffer within the physical core that performed the read,” elaborated Intel.
“That core can then use the value from the microarchitectural fill buffer (for example, the core could copy the value into software-visible registers). This...
Continue reading...