this post was submitted on 11 Jul 2025
53 points (100.0% liked)

Cybersecurity

7823 readers
138 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] thisbenzingring@lemmy.sdf.org 7 points 5 days ago (1 children)

That said, exploiting these flaws requires an attacker to obtain malicious access to a machine and possess the ability to run arbitrary code. It's not exploitable through malicious websites.

and it probably has to attack through the virtual machine environment

In a worst-case scenario, successful attacks carried out using TSA-L1 or TSA-SQ flaws could lead to information leakage from the operating system kernel to a user application, from a hypervisor to a guest virtual machine, or between two user applications.

so it is a far fetched exploit needing specific conditions that are generally not available for 99% of the machines outside the lab where this is happening.

its FUD

[โ€“] Zikeji@programming.dev 9 points 5 days ago

It's pretty relevant to hosting providers, especially VPS providers. But if you have an AMD processor in your home PC / laptop, not really relevant to you.