Speculative Store Bypass

Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities.[1] It affects the ARM, AMD and Intel families of processors. It was discovered by researchers at Microsoft Security Response Center and Google Project Zero (GPZ).[2] After being leaked on 3 May 2018 as part of a group of eight additional Spectre-class flaws provisionally named Spectre-NG,[3][4][5][6] it was first disclosed to the public as "Variant 4" on 21 May 2018, alongside a related speculative execution vulnerability designated "Variant 3a".[7][1]

  1. ^ a b Cite error: The named reference ARST-20180522 was invoked but never defined (see the help page).
  2. ^ Cite error: The named reference ubuntu-wiki-v4 was invoked but never defined (see the help page).
  3. ^ Cite error: The named reference Schmidt_2018_NG was invoked but never defined (see the help page).
  4. ^ Cite error: The named reference Fischer_2018_NG was invoked but never defined (see the help page).
  5. ^ Cite error: The named reference Tung_2018_NG was invoked but never defined (see the help page).
  6. ^ Cite error: The named reference Kumar_2018_NG was invoked but never defined (see the help page).
  7. ^ Cite error: The named reference INTEL-SA-00115 was invoked but never defined (see the help page).