A series of discovered hardware vulnerability in Intel pours from the horn of plenty. Recently a team of researchers has discovered a new variant of a vulnerability Zombieload v2, which can be exploited on the Intel Cascade Lake. It includes as HEDT chips Cascade Lake-X in the performance LGA2066, and server options Cascade Lake-SP/AP.
On the first version Zombieload became known in may of this year, along with several other problems: Fallout, RIDL (Rogue In-Flight Load Data) and Store-to-Leak Forwarding. Tellingly, the processor Cascade Lake was partially protected by a hardware patch from v1 Zombieload, but as you can see, it was not enough.
Intel calls the vulnerability of Transactional Asynchronous Abort or TAA. A new variant of attack Zombieload allows hackers to read user data stored in the RAM. The vulnerability lies in the mechanism of a prediction of passages. It speeds up the processor, but its faulty implementation allows attackers to extract potentially sensitive data.
Intel yesterday released a set of microcode patches in the monthly update Intel Platform Update. In total there are about 77 vulnerabilities, ten of which were discovered by third party researchers, and the vast majority — employees of Intel. In addition Zombieload v2 may mention the problem JCC Erratum.
Fixing it negatively affects the performance of modern CPUs by up to 5%. Detailed performance tests with the patches and without them in the Linux environment can be found on the Phoronix website.