this post was submitted on 19 Oct 2024
58 points (100.0% liked)

Cybersecurity

5861 readers
265 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
 

he latest generations of Intel processors, including Xeon chips, and AMD's older microarchitectures on Linux are vulnerable to new speculative execution attacks that bypass existing ‘Spectre’ mitigations.

top 7 comments
sorted by: hot top controversial new old
[–] M600 15 points 2 months ago (1 children)

The vulnerabilities impact Intel's 12th, 13th, and 14th chip generations for consumers and the 5th and 6th generation of Xeon processors for servers, along with AMD's Zen 1, Zen 1+, and Zen 2 processors.

[–] [email protected] 13 points 2 months ago (1 children)

Laughs in Zen 3..... For now 🫠

[–] scrion 7 points 2 months ago (1 children)

From the article:

AMD also confirmed the vulnerability and said that the flaw had already been documented and tracked as CVE-2022-23824. It is worth noting that AMD’s advisory includes Zen 3 products as beeing affected, which are not listed in ETH Zurich’s paper.

[–] [email protected] 8 points 2 months ago* (last edited 2 months ago)

😱🔫.... Cries in Zen 3

[–] ThePantser -4 points 2 months ago (2 children)

Ooo Windows fanboys creaming in their pants to throw this in the Linux fanboys face.

[–] [email protected] 6 points 2 months ago
[–] Macropolis 3 points 2 months ago

I don't think windows users care about vulnerabilities like this it they wouldn't be using Windows