Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v95eog$pu8a$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v95eog$pu8a$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Stephen Fuld" <SFuld@alumni.cmu.edu.invalid>
Newsgroups: comp.arch
Subject: A different type of security vulnerability
Date: Fri, 9 Aug 2024 16:05:36 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <v95eog$pu8a$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 09 Aug 2024 18:05:36 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="dc2828c405bf54d43deeaa9c164b175d";
	logging-data="850186"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18/EUX+AVX3F+S8j2JWI8Up0qcQhH3A0NI="
User-Agent: XanaNews/1.21-f3fb89f (x86; Portable ISpell)
Cancel-Lock: sha1:N1avZhlDnMQoIZ5Rbg8UZrS5mTM=
Bytes: 1233

This is totally different from the raft of side channel attacks we have
seen recently.  It seems much harder to implement, but potentially much
more devastating.

https://www.wired.com/story/amd-chip-sinkclose-flaw/


-- 
 - Stephen Fuld 
(e-mail address disguised to prevent spam)