Path: ...!3.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Stephen Fuld" Newsgroups: comp.arch Subject: Re: A different type of security vulnerability Date: Fri, 9 Aug 2024 17:52:50 -0000 (UTC) Organization: A noiseless patient Spider Lines: 14 Message-ID: References: <60819cad802348b1a3c11eb4f69b399f@www.novabbs.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Injection-Date: Fri, 09 Aug 2024 19:52:51 +0200 (CEST) Injection-Info: dont-email.me; posting-host="dc2828c405bf54d43deeaa9c164b175d"; logging-data="2818881"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18Ti7lf9ZcKHOnVCZzkVhkk+pX+wfSCP3o=" User-Agent: XanaNews/1.21-f3fb89f (x86; Portable ISpell) Cancel-Lock: sha1:4+ICqXt38yYOulUiFiKJ4RH24gY= Bytes: 1321 MitchAlsup1 wrote: > If only x86 chips came out of RESET with the MMUs > already turned on. Probably sufficient, but not necessary. Apparently Intel chips are not vulnerable to this particular atack. -- - Stephen Fuld (e-mail address disguised to prevent spam)