Tom's Hardware has an article that explain the high level exploit, and there's the official vulnerabilities' website with links to the papers.
..looks so strange to have vulnerabilities with an "official website" and logo..
At the end, these exploits are using a couple of features that all modern browsers provide:
Shared buffers are used to poison the CPU branch prediction logic, and then retrieve the content of the cache. To be able to identify if the data are from the cache or not, a sub-millisecond timer is required.
The first line of action it has been to disable, by default, the shared buffers functionality and then to reduce the precision of the High Precision Timers (adding some Jittering).