FreeBSD Security Advisory - A number of issues relating to speculative execution were found last year and publicly announced January 3rd. Two of these, known as Meltdown and Spectre V2, are addressed here.
64e40208fb8f828b69a524f8d55fae8ef0a49e50ff59ebe4b5a0f73e1dd0d4db
Whitepaper called Meltdown. It discusses how you can bypass Intel's hardware barrier between applications and the computer's core memory.
593ea59090a096211b06194fb5985d5c2ea2b5bd85b540d01802d5d7da2d36f8
Whitepaper called Spectre Attacks: Exploiting Speculative Execution. It discusses how to trick error-free applications into giving up secret information.
d1a3c8c49faea6321bd01e706e0957012c18a94e1a187f1a5477c0e82270dc51
Spectre information disclosure proof of concept exploit that affects multiple CPUs.
473bf133f40fdcb9c9fa158c19b9d4681907d8e8c18230aea02e37e689ee7f95
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper the authors demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing round. Unlike previous attacks, the attack targets the last level L3 cache. Consequently, the spy program and the victim do not need to share the execution core of the CPU. The attack is not limited to a traditional OS and can be used in a virtualised environment, where it can attack programs executing in a different VM.
f1a8c035ded50fee813097159a649c53b1e7d138707109f040babf40b0f6a860