Benjamin Carr, Ph.D. 👨🏻💻🧬<p><a href="https://hachyderm.io/tags/AMD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AMD</span></a> warns of new <a href="https://hachyderm.io/tags/Meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meltdown</span></a>, <a href="https://hachyderm.io/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a>-like bugs affecting <a href="https://hachyderm.io/tags/CPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPU</span></a><br>Four bugs do not appear too venomous – two have medium-severity ratings other two are rated "low." However, low-level nature of <a href="https://hachyderm.io/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a>'s impact has nonetheless led Trend Micro and CrowdStrike to assess them as "critical."<br>Rasons for low severity scores are high degree of complexity involved in successful attack – AMD said it could only be carried out by attacker able to run arbitrary code on a target machine<br><a href="https://www.theregister.com/2025/07/09/amd_tsa_side_channel/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/07/09/amd</span><span class="invisible">_tsa_side_channel/</span></a></p>