Load_value_injection

Load value injection

Load value injection

Microprocessor security vulnerability


Load value injection (LVI) is an attack on Intel microprocessors that can be used to attack Intel's Software Guard Extensions (SGX) technology.[1] It is a development of the previously known Meltdown security vulnerability. Unlike Meltdown, which can only read hidden data, LVI can inject data values, and is resistant to the countermeasures so far used to mitigate the Meltdown vulnerability.[2][3]

Quick Facts CVE identifier(s), Date discovered ...

In theory, any processor affected by Meltdown may be vulnerable to LVI,[4] but as of March 2020, LVI is only known to affect Intel microprocessors.[2] Intel has published a guide to mitigating the vulnerability by using compiler technology, requiring existing software to be recompiled to add LFENCE memory barrier instructions at every potentially vulnerable point in the code.[5] However, this mitigation appears likely to result in substantial performance reductions in the recompiled code.[6]

See also


References

  1. "Load Value Injection". software.intel.com. 2020-03-10. Retrieved 2020-03-11.
  2. Cimpanu, Catalin. "Intel CPUs vulnerable to new LVI attacks". ZDNet. Retrieved 2020-03-11.
  3. Alcorn, Paul (10 March 2020). "New Load Value Injection Vulnerability Found In Intel Chips". Tom's Hardware. Retrieved 2020-03-11.
  4. "An Optimized Mitigation Approach for Load Value Injection". software.intel.com. Retrieved 2020-03-11.

Share this article:

This article uses material from the Wikipedia article Load_value_injection, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.