Knowledge (XXG)

Microarchitectural Data Sampling

Source 📝

141: 108: 35: 130: 172: 216: 205: 194: 183: 119: 161: 152: 2757: 412:
Intel characterized the vulnerabilities as "low-to-medium" impact, disagreeing with the security researchers who characterized them as major, and disagreeing with their recommendation that operating system software manufacturers should completely disable
618: 385:
with Intel, published the discovery of the MDS vulnerabilities in Intel microprocessors, which they named Fallout, RIDL and ZombieLoad. Three of the TU Graz researchers were from the group who had discovered
1600: 1620: 1131: 866:"Intel: You don't need to disable Hyper-Threading to protect against the ZombieLoad CPU exploit - "ZombieLoad" exploit seems to put Intel's Hyper-Threading at risk of being put down" 1032:
Minkin, Marina; Moghimi, Daniel; Lipp, Moritz; Schwarz, Michael; Van Bulck, Jo; Genkin, Daniel; Gruss, Daniel; Piessens, Frank; Sunar, Berk; Yarom, Yuval (2019-05-14).
417:. Nevertheless, the ZombieLoad vulnerability can be used by hackers exploiting the vulnerability to steal information recently accessed by the affected microprocessor. 2777: 366:, Intel's researchers discovered the vulnerabilities in 2018 before anyone else. Other researchers had agreed to keep the exploit confidential as well since 2018. 1286: 1020:
van Schaik, Stephan; Milburn, Alyssa; Österlund, Sebastian; Frigo, Pietro; Maisuradze, Giorgi; Razavi, Kaveh; Bos, Herbert; Giuffrida, Cristiano (2019-05-14).
1772: 1312: 1124: 1590: 1080: 279:, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled 1534: 441:
are necessary. As of 14 May 2019, applying available updates on an affected PC system was the most that could be done to mitigate the issues.
1117: 485: 608: 1580: 1349: 1253: 20: 582: 562: 1704: 953: 2118: 1585: 892: 2782: 2252: 2234: 1735: 1513: 1279: 2258: 1784: 1745: 1380: 1172: 387: 1559: 2264: 1839: 1730: 1222: 1008:
Schwarz, Michael; Lipp, Moritz; Moghimi, Daniel; Van Bulck, Jo; Stecklina, Julian; Prescher, Thomas; Gruss, Daniel (2019-05-14).
391: 405:
According to varying reports, Intel processors dating back to 2011 or 2008 are affected, and the fixes may be associated with a
1666: 1503: 1405: 1197: 761: 220: 2792: 1725: 1498: 865: 311:, which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of reading 409:
drop. Intel reported that processors manufactured in the month before the disclosure have mitigations against the attacks.
2761: 1605: 1317: 1307: 1272: 1057: 370: 123: 2747: 2479: 1869: 1656: 1595: 1554: 1452: 1103: 838: 378: 176: 669: 1974: 1709: 1472: 397:
On 12 November 2019, a new variant of the ZombieLoad attack, called Transactional Asynchronous Abort, was disclosed.
2787: 2663: 2004: 1859: 1651: 1544: 1488: 1212: 445:
Intel incorporated fixes in its processors starting shortly before the public announcement of the vulnerabilities.
2144: 2113: 1740: 1238: 1162: 1143: 268: 2282: 1849: 1767: 1673: 1646: 1217: 1072: 532: 2438: 2102: 1575: 1508: 1354: 1167: 2312: 2168: 1999: 1661: 919: 382: 209: 112: 2453: 2288: 2072: 1436: 1248: 1243: 1207: 1182: 1140: 490: 308: 975: 786: 693: 2216: 2097: 1809: 1518: 1467: 1462: 1187: 1045: 406: 2715: 2587: 1615: 1431: 1157: 839:"Benchmarking AMD FX vs. Intel Sandy/Ivy Bridge CPUs Following Spectre, Meltdown, L1TF, Zombieload" 165: 736: 2725: 2720: 2617: 2246: 2009: 1935: 1625: 1426: 1109: 198: 348: 39:
Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor.
34: 945: 2730: 2612: 2582: 2186: 2042: 1400: 1364: 426: 2658: 2510: 2433: 2082: 2019: 1894: 1343: 465: 320: 50: 45: 2668: 2643: 2607: 2535: 2448: 2443: 2087: 1879: 1789: 1493: 276: 976:"Apple, Amazon, Google, Microsoft and Mozilla release patches for ZombieLoad chip flaws" 475:
published a security advisory on its website detailing its plans to mitigate ZombieLoad.
2407: 2402: 2092: 2077: 2067: 2062: 1994: 1969: 1964: 1959: 1904: 1359: 594: 430: 414: 234: 369:
On 14 May 2019, various groups of security researchers, amongst others from Austria's
2771: 2530: 1989: 1948: 1944: 1940: 215: 204: 193: 2474: 2428: 2228: 2192: 2047: 2037: 1930: 1925: 1920: 1794: 1610: 1539: 737:"True to its name, Intel CPU flaw ZombieLoad comes shuffling back with new variant" 449: 434: 595:
Let's Talk To Linux Kernel Developer Greg Kroah-Hartman | Open Source Summit, 2019
342: 336: 330: 324: 78: 72: 66: 60: 54: 2710: 2700: 2648: 2556: 2500: 2412: 2361: 2222: 2052: 1779: 1410: 312: 187: 171: 810: 2653: 2638: 2566: 2356: 2306: 2210: 2162: 2138: 2126: 1984: 1909: 1899: 1889: 1874: 1834: 1759: 1390: 1177: 1009: 453: 272: 533:"Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs" 2684: 2561: 2525: 2515: 2387: 2204: 1954: 1884: 1824: 1385: 897: 461: 438: 374: 363: 231: 145: 134: 107: 1033: 2756: 2592: 2520: 2505: 2324: 2300: 2174: 2156: 2057: 1979: 1814: 1799: 1699: 1678: 1457: 1202: 870: 843: 815: 1021: 2622: 2495: 2458: 2392: 2371: 2341: 2294: 2276: 2198: 2132: 1914: 1829: 1819: 1804: 1264: 924: 182: 160: 151: 129: 118: 2705: 2597: 2551: 2366: 2180: 2150: 2029: 2014: 1844: 1683: 1395: 787:"New secret-spilling flaw affects almost every Intel chip since 2011" 613: 468:
released emergency patches for their products to mitigate ZombieLoad.
457: 1044:
Galowicz, Jacek; Prescher, Thomas; Stecklina, Julian (2019-05-14).
2330: 2270: 2240: 1549: 537: 472: 140: 341:
Microarchitectural Data Sampling Uncacheable Memory (MDSUM), CVE-
2602: 2397: 1641: 1094: 762:"Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack" 642: 1268: 1113: 1081:"Deep Dive: Intel Analysis of Microarchitectural Data Sampling" 250: 1073:"Side Channel Vulnerability Microarchitectural Data Sampling" 893:"ZombieLoad attack lets hackers steal data from Intel chips" 563:"New RIDL and Fallout Attacks Impact All Modern Intel CPUs" 1099: 335:
Microarchitectural Fill Buffer Data Sampling (MFBDS), CVE-
1581:
Hollywood Presbyterian Medical Center ransomware incident
711: 245: 811:"Intel Zombieload bug fix to slow data centre computers" 354:
Not all processors are affected by all variants of MDS.
329:
Microarchitectural Load Port Data Sampling (MLPDS), CVE-
319:
Microarchitectural Store Buffer Data Sampling (MSBDS),
637: 635: 583:
Spectre-NG-Lücken: OpenBSD schaltet Hyper-Threading ab
2745: 1053: 1010:"ZombieLoad: Cross-Privilege-Boundary Data Sampling" 2693: 2677: 2631: 2575: 2544: 2488: 2467: 2421: 2380: 2349: 2340: 2111: 2028: 1858: 1758: 1718: 1692: 1634: 1568: 1527: 1481: 1445: 1419: 1373: 1336: 1329: 1231: 1213:
Rogue System Register Read (Spectre-NG, Variant 3a)
1150: 1046:"ZombieLoad: Cross Privilege-Boundary Data Leakage" 240: 226: 101: 93: 85: 44: 448:On 14 May 2019, a mitigation was released for the 698:The Linux kernel user's and administrator's guide 307:The vulnerabilities are in the implementation of 1218:Speculative Store Bypass (Spectre-NG, Variant 4) 1034:"Fallout: Reading Kernel Writes From User Space" 920:"What To Do About the Nasty New Intel Chip Flaw" 362:According to Intel in a May 2019 interview with 315:found between different parts of the processor. 1621:Russian interference in the 2016 U.S. elections 609:"Intel Confirms 'ZombieLoad 2' Security Threat" 1280: 1125: 8: 1168:Branch Target Injection (Spectre, Variant 2) 526: 27: 1591:Democratic National Committee cyber attacks 1208:Rogue Data Cache Load (Meltdown, Variant 3) 524: 522: 520: 518: 516: 514: 512: 510: 508: 506: 2346: 1535:Office of Personnel Management data breach 1333: 1287: 1273: 1265: 1132: 1118: 1110: 664: 662: 33: 1095:Official disclosure website of ZombieLoad 1158:Bounds Check Bypass (Spectre, Variant 1) 1066:Information from processor manufacturers 585:, heise.de, 2018-06, accessed 2019-09-29 347:Transactional Asynchronous Abort (TAA), 2778:Transient execution CPU vulnerabilities 2752: 502: 486:Transient execution CPU vulnerabilities 1163:Bounds Check Bypass Store (Spectre-NG) 918:O'Neill, Patrick Howell (2019-05-14). 26: 1254:Transient execution CPU vulnerability 556: 554: 21:Transient execution CPU vulnerability 7: 1586:Commission on Elections data breach 1183:Lazy FP state restore (Spectre-NG) 1002:Original papers by the researchers 694:"Microarchitectural Data Sampling" 14: 1746:Jeff Bezos phone hacking incident 1022:"RIDL: Rogue In-Flight Data Load" 891:Kastrenakes, Jacob (2019-05-14). 2755: 2319:Microarchitectural Data Sampling 1555:Ukrainian Power Grid Cyberattack 1463:Cyberterrorism attack of June 25 1193:Microarchitectural Data Sampling 261:Microarchitectural Data Sampling 214: 203: 192: 181: 170: 159: 150: 139: 128: 117: 106: 28:Microarchitectural Data Sampling 1667:2017 Ukraine ransomware attacks 1504:2014 JPMorgan Chase data breach 956:from the original on 2019-05-15 837:Larabel, Michael (2019-05-24). 621:from the original on 2020-01-14 221:Worcester Polytechnic Institute 1499:2014 celebrity nude photo leak 864:Mah Ung, Gordan (2019-05-15). 785:Whittaker, Zach (2019-05-14). 531:Greenberg, Andy (2019-05-14). 1: 1736:Bulgarian revenue agency hack 1514:Russian hacker password theft 1100:RIDL and Fallout: MDS attacks 1058:Graz University of Technology 735:Nichols, Shaun (2019-11-12). 375:Catholic University of Leuven 371:Graz University of Technology 135:Catholic University of Leuven 124:Graz University of Technology 1870:Bangladesh Black Hat Hackers 1346:(publication of 2009 events) 1104:Vrije Universiteit Amsterdam 607:Winder, Davey (2019-11-13). 561:Ilascu, Ionut (2019-05-14). 379:Vrije Universiteit Amsterdam 177:Vrije Universiteit Amsterdam 1731:Baltimore ransomware attack 271:are a set of weaknesses in 2809: 2005:Tailored Access Operations 1652:WannaCry ransomware attack 1545:Ashley Madison data breach 1489:Anthem medical data breach 1406:PlayStation network outage 1048:. Cyberus Technology GmbH. 18: 2783:Intel x86 microprocessors 1741:WhatsApp snooping scandal 1606:Indian Bank data breaches 1300: 1239:Cache side-channel attack 950:The Linux Kernel Archives 289:Rogue In-Flight Data Load 273:Intel x86 microprocessors 32: 2283:Speculative Store Bypass 1850:Ukrainian Cyber Alliance 1647:2017 Macron e-mail leaks 1144:security vulnerabilities 1657:Westminster data breach 1576:Bangladesh Bank robbery 1519:2014 Yahoo! data breach 1509:2014 Sony Pictures hack 1468:2013 Yahoo! data breach 1453:South Korea cyberattack 1355:Operation Olympic Games 1350:Australian cyberattacks 2762:Business and economics 2000:Syrian Electronic Army 1710:SingHealth data breach 1473:Singapore cyberattacks 1411:RSA SecurID compromise 383:disclosure coordinated 210:University of Michigan 113:University of Adelaide 2793:X86 memory management 2289:Lazy FP state restore 2073:Kristoffer von Hassel 1726:Sri Lanka cyberattack 1596:Vietnam Airport Hacks 1437:Operation High Roller 1249:Speculative execution 1244:Hardware security bug 1141:Speculative execution 741:www.theregister.co.uk 491:Hardware security bug 309:speculative execution 2235:Silent Bob is Silent 1295:Hacking in the 2010s 1188:Load value injection 1083:. Intel. 2019-05-14. 1075:. Intel. 2019-05-14. 647:zombieloadattack.com 251:ZombieLoadAttack.com 2169:SS7 vulnerabilities 1705:Atlanta cyberattack 1674:Equifax data breach 1432:Stratfor email leak 1381:Canadian government 1360:Operation ShadowNet 643:"ZombieLoad Attack" 565:. Bleeping Computer 377:, and Netherlands' 166:Saarland University 75:(RIDL, ZombieLoad), 69:(RIDL, ZombieLoad), 29: 16:CPU vulnerabilities 2618:Petya and NotPetya 2247:ROCA vulnerability 2010:The Shadow Brokers 1936:Iranian Cyber Army 1862:persistent threats 1662:Petya and NotPetya 1626:2016 Bitfinex hack 1601:DCCC cyber attacks 1560:SWIFT banking hack 760:Cimpanu, Catalin. 597:, TFIR, 2019-09-03 199:Oracle Corporation 156:Cyberus Technology 2788:2019 in computing 2743: 2742: 2739: 2738: 2731:ZeroAccess botnet 2043:Mustafa Al-Bassam 1810:New World Hackers 1773:associated events 1754: 1753: 1550:VTech data breach 1401:Operation AntiSec 1365:Operation Payback 1324: 1323: 1262: 1261: 974:Whittaker, Zach. 946:"ChangeLog-5.1.2" 427:operating systems 394:the year before. 257: 256: 227:Affected hardware 46:CVE identifier(s) 2800: 2760: 2759: 2751: 2347: 2020:Yemen Cyber Army 1344:Operation Aurora 1334: 1303: 1302: 1289: 1282: 1275: 1266: 1134: 1127: 1120: 1111: 1084: 1076: 1061: 1049: 1040: 1038: 1028: 1026: 1016: 1014: 990: 989: 987: 986: 971: 965: 964: 962: 961: 942: 936: 935: 933: 932: 915: 909: 908: 906: 905: 888: 882: 881: 879: 878: 861: 855: 854: 852: 851: 834: 828: 827: 825: 824: 807: 801: 800: 798: 797: 782: 776: 775: 773: 772: 757: 751: 750: 748: 747: 732: 726: 725: 723: 722: 708: 702: 701: 690: 684: 683: 681: 680: 670:"INTEL-SA-00233" 666: 657: 656: 654: 653: 639: 630: 629: 627: 626: 604: 598: 592: 586: 580: 574: 573: 571: 570: 558: 549: 548: 546: 545: 528: 471:On 14 May 2019, 253: 248: 219: 218: 208: 207: 197: 196: 186: 185: 175: 174: 164: 163: 155: 154: 144: 143: 133: 132: 122: 121: 111: 110: 37: 30: 2808: 2807: 2803: 2802: 2801: 2799: 2798: 2797: 2768: 2767: 2766: 2754: 2746: 2744: 2735: 2689: 2673: 2627: 2571: 2540: 2484: 2463: 2417: 2376: 2336: 2116: 2114:vulnerabilities 2107: 2024: 1917:(confederation) 1880:Charming Kitten 1861: 1854: 1790:Goatse Security 1750: 1714: 1688: 1679:Deloitte breach 1630: 1616:Dyn cyberattack 1564: 1523: 1494:Operation Tovar 1477: 1441: 1415: 1369: 1330:Major incidents 1325: 1296: 1293: 1263: 1258: 1227: 1146: 1138: 1091: 1079: 1071: 1068: 1052: 1043: 1036: 1031: 1024: 1019: 1012: 1007: 1004: 999: 997:Further reading 994: 993: 984: 982: 973: 972: 968: 959: 957: 944: 943: 939: 930: 928: 917: 916: 912: 903: 901: 890: 889: 885: 876: 874: 863: 862: 858: 849: 847: 836: 835: 831: 822: 820: 809: 808: 804: 795: 793: 784: 783: 779: 770: 768: 759: 758: 754: 745: 743: 734: 733: 729: 720: 718: 710: 709: 705: 692: 691: 687: 678: 676: 668: 667: 660: 651: 649: 641: 640: 633: 624: 622: 606: 605: 601: 593: 589: 581: 577: 568: 566: 560: 559: 552: 543: 541: 530: 529: 504: 499: 482: 423: 403: 360: 305: 277:hyper-threading 269:vulnerabilities 249: 244: 235:microprocessors 230:Pre-April 2019 213: 212: 202: 201: 191: 190: 180: 179: 169: 168: 158: 157: 149: 148: 138: 137: 127: 126: 116: 115: 105: 86:Date discovered 81:(ZombieLoad v2) 76: 70: 64: 58: 40: 23: 17: 12: 11: 5: 2806: 2804: 2796: 2795: 2790: 2785: 2780: 2770: 2769: 2765: 2764: 2741: 2740: 2737: 2736: 2734: 2733: 2728: 2723: 2718: 2713: 2708: 2703: 2697: 2695: 2691: 2690: 2688: 2687: 2681: 2679: 2675: 2674: 2672: 2671: 2666: 2661: 2656: 2651: 2646: 2641: 2635: 2633: 2629: 2628: 2626: 2625: 2620: 2615: 2610: 2605: 2600: 2595: 2590: 2585: 2579: 2577: 2573: 2572: 2570: 2569: 2564: 2559: 2554: 2548: 2546: 2542: 2541: 2539: 2538: 2533: 2528: 2523: 2518: 2513: 2508: 2503: 2501:Black Energy 3 2498: 2492: 2490: 2486: 2485: 2483: 2482: 2477: 2471: 2469: 2465: 2464: 2462: 2461: 2456: 2451: 2446: 2441: 2436: 2431: 2425: 2423: 2419: 2418: 2416: 2415: 2410: 2408:Metulji botnet 2405: 2400: 2395: 2390: 2384: 2382: 2378: 2377: 2375: 2374: 2369: 2364: 2362:Black Energy 2 2359: 2353: 2351: 2344: 2338: 2337: 2335: 2334: 2328: 2322: 2316: 2310: 2304: 2298: 2292: 2286: 2280: 2274: 2268: 2262: 2256: 2250: 2244: 2238: 2232: 2226: 2220: 2217:Broadcom Wi-Fi 2214: 2208: 2202: 2196: 2190: 2184: 2178: 2172: 2166: 2160: 2154: 2148: 2142: 2136: 2130: 2123: 2121: 2109: 2108: 2106: 2105: 2100: 2095: 2090: 2085: 2080: 2078:Junaid Hussain 2075: 2070: 2068:Jeremy Hammond 2065: 2063:Elliott Gunton 2060: 2055: 2050: 2045: 2040: 2034: 2032: 2026: 2025: 2023: 2022: 2017: 2012: 2007: 2002: 1997: 1995:Stealth Falcon 1992: 1987: 1982: 1977: 1972: 1970:PLA Unit 61486 1967: 1965:PLA Unit 61398 1962: 1960:Numbered Panda 1957: 1952: 1938: 1933: 1928: 1923: 1918: 1912: 1907: 1905:Equation Group 1902: 1897: 1892: 1887: 1882: 1877: 1872: 1866: 1864: 1856: 1855: 1853: 1852: 1847: 1842: 1837: 1832: 1827: 1822: 1817: 1812: 1807: 1802: 1797: 1792: 1787: 1782: 1777: 1776: 1775: 1764: 1762: 1756: 1755: 1752: 1751: 1749: 1748: 1743: 1738: 1733: 1728: 1722: 1720: 1716: 1715: 1713: 1712: 1707: 1702: 1696: 1694: 1690: 1689: 1687: 1686: 1681: 1676: 1671: 1670: 1669: 1659: 1654: 1649: 1644: 1638: 1636: 1632: 1631: 1629: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1578: 1572: 1570: 1566: 1565: 1563: 1562: 1557: 1552: 1547: 1542: 1537: 1531: 1529: 1525: 1524: 1522: 1521: 1516: 1511: 1506: 1501: 1496: 1491: 1485: 1483: 1479: 1478: 1476: 1475: 1470: 1465: 1460: 1455: 1449: 1447: 1443: 1442: 1440: 1439: 1434: 1429: 1423: 1421: 1417: 1416: 1414: 1413: 1408: 1403: 1398: 1396:HBGary Federal 1393: 1388: 1383: 1377: 1375: 1371: 1370: 1368: 1367: 1362: 1357: 1352: 1347: 1340: 1338: 1331: 1327: 1326: 1322: 1321: 1315: 1310: 1301: 1298: 1297: 1294: 1292: 1291: 1284: 1277: 1269: 1260: 1259: 1257: 1256: 1251: 1246: 1241: 1235: 1233: 1229: 1228: 1226: 1225: 1220: 1215: 1210: 1205: 1200: 1195: 1190: 1185: 1180: 1175: 1170: 1165: 1160: 1154: 1152: 1148: 1147: 1139: 1137: 1136: 1129: 1122: 1114: 1108: 1107: 1097: 1090: 1089:External links 1087: 1086: 1085: 1077: 1067: 1064: 1063: 1062: 1050: 1041: 1029: 1017: 1003: 1000: 998: 995: 992: 991: 966: 952:. 2019-05-14. 937: 910: 883: 856: 829: 802: 777: 752: 727: 716:mdsattacks.com 703: 685: 658: 631: 599: 587: 575: 550: 501: 500: 498: 495: 494: 493: 488: 481: 478: 477: 476: 469: 446: 431:virtualization 422: 419: 415:hyperthreading 402: 399: 359: 356: 352: 351: 349:CVE-2019-11135 345: 339: 333: 327: 304: 301: 255: 254: 246:mdsattacks.com 242: 238: 237: 228: 224: 223: 103: 99: 98: 95: 91: 90: 87: 83: 82: 48: 42: 41: 38: 15: 13: 10: 9: 6: 4: 3: 2: 2805: 2794: 2791: 2789: 2786: 2784: 2781: 2779: 2776: 2775: 2773: 2763: 2758: 2753: 2749: 2732: 2729: 2727: 2724: 2722: 2719: 2717: 2714: 2712: 2709: 2707: 2704: 2702: 2699: 2698: 2696: 2692: 2686: 2683: 2682: 2680: 2676: 2670: 2667: 2665: 2662: 2660: 2657: 2655: 2652: 2650: 2647: 2645: 2642: 2640: 2637: 2636: 2634: 2630: 2624: 2621: 2619: 2616: 2614: 2611: 2609: 2606: 2604: 2601: 2599: 2596: 2594: 2591: 2589: 2586: 2584: 2581: 2580: 2578: 2574: 2568: 2565: 2563: 2560: 2558: 2555: 2553: 2550: 2549: 2547: 2543: 2537: 2534: 2532: 2531:Gameover ZeuS 2529: 2527: 2524: 2522: 2519: 2517: 2514: 2512: 2509: 2507: 2504: 2502: 2499: 2497: 2494: 2493: 2491: 2487: 2481: 2478: 2476: 2473: 2472: 2470: 2466: 2460: 2457: 2455: 2452: 2450: 2447: 2445: 2442: 2440: 2437: 2435: 2432: 2430: 2427: 2426: 2424: 2420: 2414: 2411: 2409: 2406: 2404: 2401: 2399: 2396: 2394: 2391: 2389: 2386: 2385: 2383: 2379: 2373: 2370: 2368: 2365: 2363: 2360: 2358: 2355: 2354: 2352: 2348: 2345: 2343: 2339: 2332: 2329: 2326: 2323: 2320: 2317: 2314: 2311: 2308: 2305: 2302: 2299: 2296: 2293: 2290: 2287: 2284: 2281: 2278: 2275: 2272: 2269: 2266: 2263: 2260: 2257: 2254: 2251: 2248: 2245: 2242: 2239: 2236: 2233: 2230: 2227: 2224: 2221: 2218: 2215: 2212: 2209: 2206: 2203: 2200: 2197: 2194: 2191: 2188: 2185: 2182: 2179: 2176: 2173: 2170: 2167: 2164: 2161: 2158: 2155: 2152: 2149: 2146: 2143: 2140: 2137: 2134: 2131: 2128: 2125: 2124: 2122: 2120: 2115: 2110: 2104: 2101: 2099: 2096: 2094: 2091: 2089: 2086: 2084: 2081: 2079: 2076: 2074: 2071: 2069: 2066: 2064: 2061: 2059: 2056: 2054: 2051: 2049: 2046: 2044: 2041: 2039: 2036: 2035: 2033: 2031: 2027: 2021: 2018: 2016: 2013: 2011: 2008: 2006: 2003: 2001: 1998: 1996: 1993: 1991: 1990:Rocket Kitten 1988: 1986: 1983: 1981: 1978: 1976: 1973: 1971: 1968: 1966: 1963: 1961: 1958: 1956: 1953: 1950: 1946: 1942: 1941:Lazarus Group 1939: 1937: 1934: 1932: 1929: 1927: 1924: 1922: 1919: 1916: 1913: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1891: 1888: 1886: 1883: 1881: 1878: 1876: 1873: 1871: 1868: 1867: 1865: 1863: 1857: 1851: 1848: 1846: 1843: 1841: 1838: 1836: 1833: 1831: 1828: 1826: 1823: 1821: 1818: 1816: 1813: 1811: 1808: 1806: 1803: 1801: 1798: 1796: 1793: 1791: 1788: 1786: 1783: 1781: 1778: 1774: 1771: 1770: 1769: 1766: 1765: 1763: 1761: 1757: 1747: 1744: 1742: 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1723: 1721: 1717: 1711: 1708: 1706: 1703: 1701: 1698: 1697: 1695: 1691: 1685: 1684:Disqus breach 1682: 1680: 1677: 1675: 1672: 1668: 1665: 1664: 1663: 1660: 1658: 1655: 1653: 1650: 1648: 1645: 1643: 1640: 1639: 1637: 1633: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1573: 1571: 1567: 1561: 1558: 1556: 1553: 1551: 1548: 1546: 1543: 1541: 1538: 1536: 1533: 1532: 1530: 1526: 1520: 1517: 1515: 1512: 1510: 1507: 1505: 1502: 1500: 1497: 1495: 1492: 1490: 1487: 1486: 1484: 1480: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1458:Snapchat hack 1456: 1454: 1451: 1450: 1448: 1444: 1438: 1435: 1433: 1430: 1428: 1427:LinkedIn hack 1425: 1424: 1422: 1418: 1412: 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1382: 1379: 1378: 1376: 1372: 1366: 1363: 1361: 1358: 1356: 1353: 1351: 1348: 1345: 1342: 1341: 1339: 1335: 1332: 1328: 1320: → 1319: 1316: 1314: 1311: 1309: 1306:←  1305: 1304: 1299: 1290: 1285: 1283: 1278: 1276: 1271: 1270: 1267: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1236: 1234: 1230: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1189: 1186: 1184: 1181: 1179: 1176: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1155: 1153: 1149: 1145: 1142: 1135: 1130: 1128: 1123: 1121: 1116: 1115: 1112: 1106: 1105: 1101: 1098: 1096: 1093: 1092: 1088: 1082: 1078: 1074: 1070: 1069: 1065: 1060:. 2019-05-14. 1059: 1055: 1051: 1047: 1042: 1035: 1030: 1023: 1018: 1011: 1006: 1005: 1001: 996: 981: 977: 970: 967: 955: 951: 947: 941: 938: 927: 926: 921: 914: 911: 900: 899: 894: 887: 884: 873: 872: 867: 860: 857: 846: 845: 840: 833: 830: 818: 817: 812: 806: 803: 792: 788: 781: 778: 767: 763: 756: 753: 742: 738: 731: 728: 717: 713: 712:"MDS attacks" 707: 704: 700:. 2019-05-14. 699: 695: 689: 686: 675: 671: 665: 663: 659: 648: 644: 638: 636: 632: 620: 616: 615: 610: 603: 600: 596: 591: 588: 584: 579: 576: 564: 557: 555: 551: 540: 539: 534: 527: 525: 523: 521: 519: 517: 515: 513: 511: 509: 507: 503: 496: 492: 489: 487: 484: 483: 479: 474: 470: 467: 463: 459: 455: 451: 447: 444: 443: 442: 440: 436: 432: 428: 420: 418: 416: 410: 408: 400: 398: 395: 393: 389: 384: 380: 376: 372: 367: 365: 357: 355: 350: 346: 344: 340: 338: 334: 332: 328: 326: 322: 318: 317: 316: 314: 310: 302: 300: 298: 294: 290: 286: 282: 278: 274: 270: 266: 262: 252: 247: 243: 239: 236: 233: 229: 225: 222: 217: 211: 206: 200: 195: 189: 184: 178: 173: 167: 162: 153: 147: 142: 136: 131: 125: 120: 114: 109: 104: 100: 96: 92: 88: 84: 80: 74: 68: 62: 56: 52: 49: 47: 43: 36: 31: 25: 22: 2475:CryptoLocker 2318: 2229:DoublePulsar 2048:Cyber Anakin 2038:Ryan Ackroyd 1931:Helix Kitten 1926:Hacking Team 1921:Guccifer 2.0 1795:Lizard Squad 1611:Surkov leaks 1540:Hacking Team 1192: 1102: 983:. Retrieved 979: 969: 958:. Retrieved 949: 940: 929:. Retrieved 923: 913: 902:. Retrieved 896: 886: 875:. Retrieved 869: 859: 848:. Retrieved 842: 832: 821:. Retrieved 819:. 2019-05-15 814: 805: 794:. Retrieved 790: 780: 769:. Retrieved 765: 755: 744:. Retrieved 740: 730: 719:. Retrieved 715: 706: 697: 688: 677:. Retrieved 673: 650:. Retrieved 646: 623:. Retrieved 612: 602: 590: 578: 567:. Retrieved 542:. Retrieved 536: 450:Linux kernel 435:web browsers 433:mechanisms, 424: 411: 404: 396: 373:, Belgium's 368: 361: 353: 313:data buffers 306: 297:ZombieLoad 2 296: 292: 288: 284: 280: 264: 260: 258: 94:Date patched 24: 2711:NetTraveler 2649:LogicLocker 2557:Hidden Tear 2454:Red October 2313:Dragonblood 2223:EternalBlue 2187:Stagefright 2053:George Hotz 2030:Individuals 1780:CyberBerkut 407:performance 303:Description 188:Bitdefender 97:14 May 2019 2772:Categories 2654:Rensenware 2639:BrickerBot 2567:TeslaCrypt 2357:Bad Rabbit 2307:Foreshadow 2211:Cloudbleed 2163:Row hammer 2145:Shellshock 2139:Heartbleed 2127:Evercookie 2103:The Jester 1985:Red Apollo 1945:BlueNorOff 1915:GOSSIPGIRL 1910:Fancy Bear 1900:Elfin Team 1895:DarkMatter 1890:Dark Basin 1875:Bureau 121 1835:Teamp0ison 1760:Hacktivism 1391:DNSChanger 1178:Foreshadow 1054:"cpu.fail" 985:2019-05-14 980:TechCrunch 960:2019-05-15 931:2019-05-15 904:2019-05-15 877:2019-05-15 850:2019-05-25 823:2019-05-15 796:2019-05-14 791:TechCrunch 771:2019-11-12 746:2019-11-12 721:2019-05-20 679:2019-05-14 652:2019-05-14 625:2020-01-14 569:2019-05-14 544:2019-05-14 497:References 421:Mitigation 343:2019-11091 337:2018-12130 331:2018-12127 325:2018-12126 293:ZombieLoad 102:Discoverer 79:2019-11135 73:2018-12130 67:2019-11091 61:2018-12127 57:(Fallout), 55:2018-12126 19:See also: 2685:VPNFilter 2562:Rombertik 2526:FinFisher 2516:DarkHotel 2480:DarkSeoul 2388:Coreflood 2253:BlueBorne 2205:Dirty COW 2119:disclosed 2117:publicly 1955:NSO Group 1885:Cozy Bear 1825:PayPal 14 1768:Anonymous 1642:SHAttered 1386:DigiNotar 898:The Verge 462:Microsoft 439:microcode 425:Fixes to 275:that use 232:Intel x86 146:Qihoo 360 2726:Titanium 2669:XafeCopy 2664:WannaCry 2593:KeRanger 2521:Duqu 2.0 2506:Carbanak 2325:BlueKeep 2301:SigSpoof 2259:Meltdown 2175:WinShock 2157:Rootpipe 2058:Guccifer 1980:Pranknet 1975:PLATINUM 1949:AndAriel 1860:Advanced 1815:NullCrew 1800:LulzRaft 1700:Trustico 1313:Timeline 1203:Retbleed 1173:Downfall 1151:Variants 954:Archived 871:PC World 844:Phoronix 816:BBC News 619:Archived 480:See also 388:Meltdown 2623:X-Agent 2613:Pegasus 2496:Brambul 2459:Shamoon 2403:Kelihos 2393:Alureon 2372:Stuxnet 2342:Malware 2295:TLBleed 2277:Exactis 2265:Spectre 2199:Badlock 2133:iSeeYou 2098:Topiary 1830:RedHack 1820:OurMine 1805:LulzSec 1223:Spoiler 925:Gizmodo 392:Spectre 381:, in a 358:History 295:., and 281:Fallout 241:Website 63:(RIDL), 2748:Portal 2706:Joanap 2659:Triton 2598:Necurs 2588:Jigsaw 2583:Hitler 2552:Dridex 2511:Careto 2434:Dexter 2367:SpyEye 2333:(2019) 2327:(2019) 2321:(2019) 2315:(2019) 2309:(2018) 2303:(2018) 2297:(2018) 2291:(2018) 2285:(2018) 2279:(2018) 2273:(2018) 2267:(2018) 2261:(2018) 2255:(2017) 2249:(2017) 2243:(2017) 2237:(2017) 2231:(2017) 2225:(2017) 2219:(2017) 2213:(2017) 2207:(2016) 2201:(2016) 2195:(2016) 2189:(2015) 2183:(2015) 2181:JASBUG 2177:(2014) 2171:(2014) 2165:(2014) 2159:(2014) 2153:(2014) 2151:POODLE 2147:(2014) 2141:(2014) 2135:(2013) 2129:(2010) 2112:Major 2093:Track2 2015:xDedic 1845:UGNazi 1232:Topics 1198:Pacman 614:Forbes 466:Amazon 464:, and 458:Google 452:, and 401:Impact 2721:Tinba 2608:Mirai 2536:Regin 2449:Mahdi 2444:Flame 2429:Carna 2413:Stars 2331:Kr00k 2271:EFAIL 2241:KRACK 2193:DROWN 1318:2020s 1308:2000s 1037:(PDF) 1025:(PDF) 1013:(PDF) 766:ZDNet 674:Intel 538:WIRED 473:Intel 454:Apple 364:Wired 2716:R2D2 2701:Grum 2694:2019 2678:2018 2644:Kirk 2632:2017 2603:MEMZ 2576:2016 2545:2015 2489:2014 2468:2013 2422:2012 2398:Duqu 2381:2011 2350:2010 2088:Sabu 1840:TDO 1785:GNAA 1719:2019 1693:2018 1635:2017 1569:2016 1528:2015 1482:2014 1446:2013 1420:2012 1374:2011 1337:2010 437:and 390:and 285:RIDL 259:The 89:2018 77:CVE- 71:CVE- 65:CVE- 59:CVE- 2439:FBI 2083:MLT 1947:) ( 321:CVE 291:), 265:MDS 51:CVE 2774:: 1056:. 978:. 948:. 922:. 895:. 868:. 841:. 813:. 789:. 764:. 739:. 714:. 696:. 672:. 661:^ 645:. 634:^ 617:. 611:. 553:^ 535:. 505:^ 460:, 456:, 429:, 299:. 283:, 267:) 2750:: 1951:) 1943:( 1288:e 1281:t 1274:v 1133:e 1126:t 1119:v 1039:. 1027:. 1015:. 988:. 963:. 934:. 907:. 880:. 853:. 826:. 799:. 774:. 749:. 724:. 682:. 655:. 628:. 572:. 547:. 323:- 287:( 263:( 53:-

Index

Transient execution CPU vulnerability

CVE identifier(s)
CVE
2018-12126
2018-12127
2019-11091
2018-12130
2019-11135
Australia
University of Adelaide
Austria
Graz University of Technology
Belgium
Catholic University of Leuven
China
Qihoo 360
Germany
Germany
Saarland University
Netherlands
Vrije Universiteit Amsterdam
Romania
Bitdefender
United States
Oracle Corporation
United States
University of Michigan
United States
Worcester Polytechnic Institute

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.