Meltdown UC

Already in March 2018, it was shown by researchers from Graz University of Technology that an attacker can leak data using Meltdown that is not stored in the L1 cache but in one of the line fill buffers. This proof-of-concept, already described in the Meltdown paper, served as the foundation for subsequent research of these buffers. Now these buffers have been exploited with ZombieLoad and RIDL.