Published in PC Hardware

AMD: Ryzen users are safe from Spoiler

by on18 March 2019

 
This is just a problem for Intel

AMD has confirmed that it does not suffer from the recent vulnerability found in processors – Spoiler.

It is starting to look like "Spoiler" will be a unique difference between Intel and AMD for some time.

For those who came in late, boffins at Worcester Polytechnic Institute in the US, and the University of Lübeck in Germany, recently discovered another speculative execution vulnerability impacting Intel processors.

At the time, the researchers tested AMD and ARM-based processors but found that they were not susceptible. Of course, Intel fan boys didn’t believe this, and now AMD has published results of its research.

Rising in its company bog, AMD said: “We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts.”

However, it does seem that AMD has had to issue some mitigations for Spectre, it is nowhere near the sort of issues that Chipzilla will have to face to fix its silicon.

Last modified on 18 March 2019
Rate this item
(0 votes)

Read more about: