A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.
access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling
blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/
bugzilla.redhat.com/show_bug.cgi?id=1788786
cacheoutattack.com/CacheOut.pdf
nvd.nist.gov/vuln/detail/CVE-2020-0548
software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling
www.cve.org/CVERecord?id=CVE-2020-0548