AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs (thehackernews.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 11 Jul 12:17
https://sh.itjust.works/post/41956788

#cybersecurity

threaded - newest

thisbenzingring@lemmy.sdf.org on 11 Jul 13:47 next collapse

That said, exploiting these flaws requires an attacker to obtain malicious access to a machine and possess the ability to run arbitrary code. It’s not exploitable through malicious websites.

and it probably has to attack through the virtual machine environment

In a worst-case scenario, successful attacks carried out using TSA-L1 or TSA-SQ flaws could lead to information leakage from the operating system kernel to a user application, from a hypervisor to a guest virtual machine, or between two user applications.

so it is a far fetched exploit needing specific conditions that are generally not available for 99% of the machines outside the lab where this is happening.

its FUD

Zikeji@programming.dev on 11 Jul 14:18 collapse

It’s pretty relevant to hosting providers, especially VPS providers. But if you have an AMD processor in your home PC / laptop, not really relevant to you.

keyez@lemmy.world on 11 Jul 15:26 collapse

I can’t fully remember from the previous Spectre and Meltdown but a BIOS update from manufacturers should be enough to patch once released right?