Path: ...!fu-berlin.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Michael S Newsgroups: comp.arch Subject: Re: YASV (Yet Another Security Vulnearability) Date: Thu, 25 Jul 2024 10:41:13 +0300 Organization: A noiseless patient Spider Lines: 17 Message-ID: <20240725104113.000006e8@yahoo.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Injection-Date: Thu, 25 Jul 2024 09:40:44 +0200 (CEST) Injection-Info: dont-email.me; posting-host="caa015b8c1f238739ab891c2ada0bcff"; logging-data="2314068"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19iPbCpWD7AkGpkQGJnyYxV42WwWRhSJGU=" Cancel-Lock: sha1:vlcVl0C+hpSFbHqf1WD0XHo2/DE= X-Newsreader: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-w64-mingw32) Bytes: 1563 On Wed, 24 Jul 2024 21:05:51 -0000 (UTC) Thomas Koenig wrote: > This time, it's "Indirector". > > https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html > > The same article also mentions that ARM have their own issue > with the Memory Tagging Extension. Once, in order to be considered attack, security researcher had to create POC exploit, no matter how unrealistic in the setup, but at least showing that the principle can work. No more, it seems. Today a simple hand-waving about possibility of attack is fully sufficient.