INTEL-SA-00115: Speculative Store Bypass
In Summary : Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to im...
https://updatesinfosec.blogspot.com/2018/05/intel-sa-00115-speculative-store-bypass_21.html
In Summary :
Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to improperly gather sensitive data from multiple types of computing devices with different vendors’ processors and operating systems. Intel is committed to product and customer security and to coordinated disclosure. We worked closely with other technology companies and several operating system and system software vendors, developing an industry-wide approach to mitigate these issues promptly. [...]
kindly refer the following link as follow up :
https://ift.tt/2IGDxmY
Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to improperly gather sensitive data from multiple types of computing devices with different vendors’ processors and operating systems. Intel is committed to product and customer security and to coordinated disclosure. We worked closely with other technology companies and several operating system and system software vendors, developing an industry-wide approach to mitigate these issues promptly. [...]
kindly refer the following link as follow up :
https://ift.tt/2IGDxmY