Bunch of other exploits rolled up... Too bad users had to wait, for again the Nth time in a couple years, for 'responsible disclosure' over their top secret closed source hardware. #OpenFabs , #OpenHW , #OpenAudit https://xenbits.xen.org/xsa/advisory-305.html https://software.intel.com/security-software-guidance/insights/deep-dive-int... TSX Asynchronous Abort (TAA, CVE-2019-11135) vulnerability An attacker, which could include a malicious untrusted user process on a trusted guest, or an untrusted guest, can sample the content of recently-used memory operands and IO Port writes. CVE-2019-11139 MD_CLEAR Operations It was discovered that certain Intel Xeon processors did not properly restrict access to a voltage modulation interface. A local privileged attacker could use this to cause a denial of service (system crash). https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915 A malicious virtual machine could use this flaw to generate an MCE resulting in a denial of service of the host OS, including all other virtual machines. Intel researchers discovered that Intel graphics processors could cause a system hang when userspace performed a read from GT memory mapped input output (MMIO) when the product is in certain low power states. A local user could use this to cause a denial of service (system hang). Intel researchers discovered that Intel graphics processors allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and exposed kernel memory information, resulting in possible privilege escalation and information disclosure vulnerabilities. A local user could use this issue to escalate their privileges on the local machine.