Jump to content

Microarchitectural Data Sampling

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Jonathan de Boyne Pollard (talk | contribs) at 19:39, 14 May 2019 (Have a stub.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of vulnerabilities in Intel x86 microprocessors that leak data across protection boundaries, that those data are not architecturally supposed to be visible across. They comprise:

ZombieLoad
a leak of already-loaded data from a processor's fill buffer
RIDL (Rogue In-Flight Data Load)
a leak from various internal processor buffers of data being loaded and stored
Fallout
a leak of data being stored from store buffers

Further reading

  • Schwarz, Michael; Lipp, Moritz; Moghimi, Daniel; Van Bulck, Jo; Stecklina, Julian; Prescher, Thomas; Gruss, Daniel (2019-05-14). "ZombieLoad: Cross-Privilege-Boundary Data Sampling" (PDF). {{cite journal}}: Cite journal requires |journal= (help); Invalid |ref=harv (help)
  • van Schaik, Stephan; Milburn, Alyssa; Österlund, Sebastian; Frigo, Pietro; Maisuradze, Giorgi; Razavi, Kaveh; Bos, Herbert; Giuffrida, Cristiano (2019-05-14). "RIDL: Rogue In-Flight Data Load" (PDF). {{cite journal}}: Cite journal requires |journal= (help); Invalid |ref=harv (help)
  • Minkin, Marina; Moghimi, Daniel; Lipp, Moritz; Schwarz, Michael; Van Bulck, Jo; Genkin, Daniel; Gruss, Daniel; Piessens, Frank; Sunar, Berk; Yarom, Yuval (2019-05-14). "Fallout: Reading Kernel Writes From User Space" (PDF). {{cite journal}}: Cite has empty unknown parameter: |1= (help); Cite journal requires |journal= (help); Invalid |ref=harv (help)
  • "cpu.fail". Graz University of Technology. 2019-05-14.

See also