Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connectionsPath: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Stefan Monnier Newsgroups: comp.arch Subject: Re: Another security vulnerability Date: Mon, 25 Mar 2024 12:26:30 -0400 Organization: A noiseless patient Spider Lines: 14 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Injection-Date: Mon, 25 Mar 2024 17:28:50 +0100 (CET) Injection-Info: dont-email.me; posting-host="82d1b87aaa7ddf8bd39513734b9ac6f6"; logging-data="1263436"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18h5tjkqur0Vh8GypJeeEU13a8FCGVu/0Q=" User-Agent: Gnus/5.13 (Gnus v5.13) Cancel-Lock: sha1:5YRGtTRFdNHxgNoY+RaKmiw/scU= sha1:ZDy0arsHp5NzdB4PuMB1Sg0QCKM= Bytes: 1476 >> So, is there a way to fix this while maintaining the feature's >> performance advantage? > Even if it’s fixed, how does that help existing users with broken > machines? Of course, the current computing world loves it even more if it pushes users to buy new machines. This said, until now manufacturers don't seem to consider side-channel attacks as something worth spending much effort to avoid, so I'd expect future machines to be just as vulnerable :-( Stefan