Many CPU architectures support lazy saving of floating point state (registers) by allowing floating point capability to be disabled, resulting in an exception when a floating point operation is performed. Virtually all floating point math is done in SSE (and thus XMM registers) in 64 bit mode. Attacker is able via a local process instead of web browser. A newly scheduled task can use the exploit described herein to infer the Floating Point register state of another task, which can be used to leak sensitive information.
Official announcement – https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
I’m quite certain I’ll learn lots of new stuff right
I¡¦ve recently started a blog, the info you provide on this site has helped me tremendously. Thanks for all of your time
I’m quite certain I’ll learn lots of new stuff right
This is a impressive story. Thanks!
With thanks! Valuable information!