Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
intel core i3 6006u |
||
intel core i3 6098p |
||
intel core i3 6102e |
||
intel core i3 6157u |
||
intel core i5 661 |
||
intel core i5 670 |
||
intel core i5 6300u |
||
intel core i5 6350hq |
||
intel core i5 6442eq |
||
intel core i5 6500 |
||
intel core i5 6500t |
||
intel core i7 610e |
||
intel core i7 620le |
||
intel core i7 640um |
||
intel core i7 660lm |
||
intel core i3 6100h |
||
intel core i3 6100t |
||
intel core i3 6320 |
||
intel core i5 650 |
||
intel core i3 6100te |
||
intel core i3 6100u |
||
intel core i5 655k |
||
intel core i5 660 |
||
intel core i5 6287u |
||
intel core i5 6300hq |
||
intel core i5 6440eq |
||
intel core i5 6440hq |
||
intel core i5 6600t |
||
intel core i5 6685r |
||
intel core i7 640lm |
||
intel core i7 640m |
||
intel core i5 6260u |
||
intel core i5 6267u |
||
intel core i5 6400t |
||
intel core i5 6402p |
||
intel core i5 6600 |
||
intel core i5 6600k |
||
intel core i7 620ue |
||
intel core i7 620um |
||
intel core i7 680um |
||
intel core i3 6100 |
||
intel core i3 6100e |
||
intel core i3 6167u |
||
intel core i3 6300 |
||
intel core i3 6300t |
||
intel core i5 680 |
||
intel core i5 6200u |
||
intel core i5 6360u |
||
intel core i5 6400 |
||
intel core i5 6500te |
||
intel core i5 6585r |
||
intel core i7 620lm |
||
intel core i7 620m |
||
intel core i7 660ue |
||
intel core i7 660um |
||
intel core i7 7y75 |
||
intel core i7 720qm |
||
intel core i7 7700 |
||
intel core i7 7700hq |
||
intel core i5 750 |
||
intel core i5 750s |
||
intel core i5 760 |
||
intel core i7 7600u |
||
intel core i7 7660u |
||
intel core i7 7820hq |
||
intel core i7 7920hq |
||
intel core i7 7560u |
||
intel core i7 7567u |
||
intel core i7 7820eq |
||
intel core i7 7820hk |
||
intel core i7 740qm |
||
intel core i7 7500u |
||
intel core i7 7700k |
||
intel core i7 7700t |
||
intel core i3 8100 |
||
intel core i7 860 |
||
intel core i7 860s |
||
intel core i7 8700 |
||
intel core i7 8700k |
||
intel core i7 820qm |
||
intel core i7 840qm |
||
intel core i7 8550u |
||
intel core i7 8650u |
||
intel core i5 8350u |
||
intel core i5 8400 |
||
intel core i5 8600k |
||
intel core i7 875k |
||
intel core i7 880 |
||
intel core i3 8350k |
||
intel core i5 8250u |
||
intel core i7 870 |
||
intel core i7 870s |
||
intel xeon e3 1240l v5 - |
||
intel xeon e3 1245 v5 - |
||
intel xeon e3 1515m_v5 |
||
intel xeon e3 1535m_v5 |
||
intel xeon e3 1585l_v5 |
||
intel xeon e3 1235l v5 - |
||
intel xeon e3 1240 v5 - |
||
intel xeon e3 1505l v5 - |
||
intel xeon e3 1505m v5 - |
||
intel xeon e3 1578l_v5 |
||
intel xeon e3 1585_v5 |
||
intel xeon e3 1225 v5 - |
||
intel xeon e3 1230 v5 - |
||
intel xeon e3 1270 v5 - |
||
intel xeon e3 1275 v5 - |
||
intel xeon e3 1280 v5 - |
||
intel xeon e3 1565l_v5 |
||
intel xeon e3 1575m_v5 |
||
intel xeon e3 1220 v5 - |
||
intel xeon e3 1260l v5 - |
||
intel xeon e3 1268l v5 - |
||
intel xeon e3 1545m_v5 |
||
intel xeon e3 1558l_v5 |
||
intel xeon e3 1275 v6 - |
||
intel xeon e3 1280 v6 - |
||
intel xeon e3 1245 v6 - |
||
intel xeon e3 1270 v6 - |
||
intel xeon e3 1535m_v6 |
||
intel xeon e3 1230 v6 - |
||
intel xeon e3 1240 v6 - |
||
intel xeon e3 1505l v6 - |
||
intel xeon e3 1505m_v6 |
||
intel xeon e3 1220 v6 - |
||
intel xeon e3 1225 v6 - |
||
intel xeon e3 1285 v6 - |
||
intel xeon e3 1501l v6 - |
||
intel xeon e3 1501m v6 - |
El Reg talks to Dr Yuval Yarom about Intel's memory leaking catastrophe Three more data-leaking security holes found in Intel chips as designers swap security for speed
Interview In the wake of yet another collection of Intel bugs, The Register had the chance to speak to Foreshadow co-discoverer and University of Adelaide and Data61 researcher Dr Yuval Yarom about its impact. Dr Yarom explained that one of the big impacts of Foreshadow is that it destroys an important trust model – SGX attestations, which guarantee that the code you publish is the code someone else is running. Think of it as tamper-evident packaging for software: having published your softwar...
Apps, kernels, virtual machines, SGX, SMM at risk from attack Another data-leaking Spectre CPU flaw among Intel's dirty dozen of security bug alerts today
Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory. These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory. SGX is Intel's technology that is supposed to protect...