Load value injection
Appearance
![]() Logo for the Load Value Injection security vulnerability | |
CVE identifier(s) | CVE-2020-0551 |
---|---|
Date discovered | March 2020 |
Affected hardware | Intel x86 microprocessors |
Website | lviattack |
Load value injection (LVI) is an attack on Intel microprocessors that can be used to attack Intel's SGX technology.[1] It is a development of the previously known Meltdown security vulnerability. Unlike Meltdown, which can only read hidden data, LVI can inject data values, and is resistant to the countermeasures so far used to mitigate the Meltdown vulnerability.[2][3]
As of March 2020[update], LVI is only known to affect Intel microprocessors.[2] Intel has published a guide to mitigating the vulnerability by using compiler technology, requiring existing software to be recompiled to add LFENCE instructions at every potentially vulnerable point in the code.[4]
References
- ^ "Load Value Injection". software.intel.com. 2020-03-10. Retrieved 2020-03-11.
{{cite web}}
: CS1 maint: url-status (link) - ^ a b Cimpanu, Catalin. "Intel CPUs vulnerable to new LVI attacks". ZDNet. Retrieved 2020-03-11.
- ^ Alcorn, Paul (10 March 2020). "New Load Value Injection Vulnerability Found In Intel Chips". Tom's Hardware. Retrieved 2020-03-11.
{{cite web}}
: CS1 maint: url-status (link) - ^ "An Optimized Mitigation Approach for Load Value Injection". software.intel.com. Retrieved 2020-03-11.
See also
External links
- https://lviattack.eu/
- https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection