This time, the attack is made on an undocumented special register buffer, which plays an important role in the implementation of the processor random number generator, this is a variation of the already known MDS bug.
The data on the vulnerability was received by the Free University of Amsterdam and ETH Zurich this spring, a demonstration exploit was developed, the data on the problem was transferred to Intel, they have already released a patch. The performance of processors, unlike Meltdown and Specter, is practically not affected.
This buffer can be accessed by any process on any core.
Source: linux.org.ru