this post was submitted on 19 Oct 2024
59 points (100.0% liked)

Cybersecurity

5754 readers
209 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
 

he latest generations of Intel processors, including Xeon chips, and AMD's older microarchitectures on Linux are vulnerable to new speculative execution attacks that bypass existing ‘Spectre’ mitigations.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 15 points 1 month ago (1 children)

The vulnerabilities impact Intel's 12th, 13th, and 14th chip generations for consumers and the 5th and 6th generation of Xeon processors for servers, along with AMD's Zen 1, Zen 1+, and Zen 2 processors.

[–] [email protected] 13 points 1 month ago (1 children)

Laughs in Zen 3..... For now 🫠

[–] [email protected] 7 points 1 month ago (1 children)

From the article:

AMD also confirmed the vulnerability and said that the flaw had already been documented and tracked as CVE-2022-23824. It is worth noting that AMD’s advisory includes Zen 3 products as beeing affected, which are not listed in ETH Zurich’s paper.

[–] [email protected] 8 points 1 month ago* (last edited 1 month ago)

😱🔫.... Cries in Zen 3