this post was submitted on 11 Jul 2025
51 points (100.0% liked)

Cybersecurity

7789 readers
55 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] thisbenzingring@lemmy.sdf.org 6 points 1 day ago (1 children)

That said, exploiting these flaws requires an attacker to obtain malicious access to a machine and possess the ability to run arbitrary code. It's not exploitable through malicious websites.

and it probably has to attack through the virtual machine environment

In a worst-case scenario, successful attacks carried out using TSA-L1 or TSA-SQ flaws could lead to information leakage from the operating system kernel to a user application, from a hypervisor to a guest virtual machine, or between two user applications.

so it is a far fetched exploit needing specific conditions that are generally not available for 99% of the machines outside the lab where this is happening.

its FUD

[โ€“] Zikeji@programming.dev 9 points 1 day ago

It's pretty relevant to hosting providers, especially VPS providers. But if you have an AMD processor in your home PC / laptop, not really relevant to you.