Intel addressed 25 vulnerabilities today as part of its June 2020 Patch Tuesday. Two of them were rated as critical security flaws after receiving CVSS scores of 9.8. Intel has released microcode updates for affected processors to address the root cause. A new side-channel vulnerability named Special Register Buffer Data Sampling (SRBDS) affects some client and Intel Xeon E3 processors but it does not affect other Intel Xeon or Atom processors. The new SRBDS domain bypass allows attackers to leak data from a micro-architectural buffer and the first cross-core transient execution attack.
Source: https://www.bleepingcomputer.com/news/security/intel-patched-22-vulnerabilities-in-the-june-2020-platform-update/

