EVGA

AMD CPUs Immune to SPOILER Vulnerability: Company Statement

Author
rjohnson11
EVGA Forum Moderator
  • Total Posts : 102262
  • Reward points : 0
  • Joined: 2004/10/05 12:44:35
  • Location: Netherlands
  • Status: online
  • Ribbons : 84
2019/03/19 11:17:51 (permalink)
https://www.overclock3d.net/news/cpu_mainboard/amd_confirms_that_their_products_are_not_impacted_by_spoiler_-_ryzen_is_safe_for_now/1
 
SPOILER, short for Speculative Load Hazards Boost Rowhammer and Cache Attacks (not sure how that abbreviates), is the latest in the long line of security vulnerabilities preying on imperfections in speculative-execution capabilities of modern processors, which surfaced early March, and affects all Intel processors. AMD put out a statement that its processors are inherently immune to SPOILER due to a fundamentally different memory management design. "We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts," the company writes in its statement.

AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

#1

0 Replies Related Threads

    Jump to:
  • Back to Mobile