| Deutsch English Français Italiano |
|
<v7rqbf$1ta84$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!3.eu.feeder.erje.net!feeder.erje.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Thomas Koenig <tkoenig@netcologne.de> Newsgroups: comp.arch Subject: YASV (Yet Another Security Vulnearability) Date: Wed, 24 Jul 2024 21:05:51 -0000 (UTC) Organization: A noiseless patient Spider Lines: 6 Message-ID: <v7rqbf$1ta84$1@dont-email.me> Injection-Date: Wed, 24 Jul 2024 23:05:51 +0200 (CEST) Injection-Info: dont-email.me; posting-host="45a9ef3acace85a386bad92d17bfb1ac"; logging-data="2009348"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+7Yr9CNi0xCM8DfiXyC3nupAt0MwgZb88=" User-Agent: slrn/1.0.3 (Linux) Cancel-Lock: sha1:MTRAtWcbHEF71fvr7DkZUwma5gQ= Bytes: 1061 This time, it's "Indirector". https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html The same article also mentions that ARM have their own issue with the Memory Tagging Extension.