54
submitted 4 weeks ago by [email protected] to c/[email protected]
top 3 comments
sorted by: hot top new old
[-] [email protected] 7 points 4 weeks ago

That said, exploiting these flaws requires an attacker to obtain malicious access to a machine and possess the ability to run arbitrary code. It's not exploitable through malicious websites.

and it probably has to attack through the virtual machine environment

In a worst-case scenario, successful attacks carried out using TSA-L1 or TSA-SQ flaws could lead to information leakage from the operating system kernel to a user application, from a hypervisor to a guest virtual machine, or between two user applications.

so it is a far fetched exploit needing specific conditions that are generally not available for 99% of the machines outside the lab where this is happening.

its FUD

[-] [email protected] 9 points 4 weeks ago

It's pretty relevant to hosting providers, especially VPS providers. But if you have an AMD processor in your home PC / laptop, not really relevant to you.

[-] [email protected] 1 points 4 weeks ago

I can't fully remember from the previous Spectre and Meltdown but a BIOS update from manufacturers should be enough to patch once released right?

this post was submitted on 11 Jul 2025
54 points (100.0% liked)

Cybersecurity

8004 readers
215 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS