acf domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/vhosts/studiogo.tech/httpdocs/upcloudold/wp-includes/functions.php on line 6131all-in-one-wp-migration domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/vhosts/studiogo.tech/httpdocs/upcloudold/wp-includes/functions.php on line 6131rocket domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/vhosts/studiogo.tech/httpdocs/upcloudold/wp-includes/functions.php on line 6131Yesterday, on the 24th of July 2023, Google Project Zero published their findings<\/a> of a new flaw in AMD’s Zen 2 processors. The vulnerability titled ‘Zenbleed’ affects the entire Zen 2 product stack, from AMD’s EPYC data center processors to the Ryzen 3000 CPUs. It can be exploited to steal sensitive data stored in the CPU, including encryption keys and login credentials.<\/p>\n\n\n\n After learning of the new vulnerability potentially affecting the majority of our server infrastructure, we immediately began evaluating and implementing the recommended mitigation measures. And by the end of the day 24th of July (UTC), we had live-patched our entire infrastructure of potentially impacted servers with AMD\u2019s microcode to mitigate this newly discovered vulnerability.<\/p>\n\n\n\n At this stage, all fixes have been applied and no actions are required from customers<\/strong>.<\/p>\n\n\n\n Speculative execution attacks have previously been used to compromise CPU registers<\/a> taking advantage of the speculative execution capabilities of modern CPUs which are used to speed up processing times. <\/p>\n\n\n\n Speculative execution is an optimization technique where the CPU performs tasks that may not be needed before it is known whether it is actually needed. Doing so can save time when the prediction is correct, however, If it turns out the work was not needed, most changes are reverted and the results are ignored.<\/p>\n\n\n\n The researchers of Project Zero at Google Information Security discovered a vulnerability in AMD’s Zen 2-architecture-based CPUs which allowed reading data from the register belonging to another process or thread. This can potentially allow an attacker access to sensitive data, and in a public cloud, including neighboring Cloud Servers.<\/p>\n\n\n\n The vulnerability is caused by a register not being correctly erased to 0 under specific microarchitectural circumstances. However, although this error is associated with speculative execution, it is not a side-channel vulnerability.<\/p>\n\n\n\nVulnerability<\/h2>\n\n\n\n
Mitigation<\/h2>\n\n\n\n