Meltdown and Spectre are bad news with a collateral B. While Intel has gotten many of a ink for a pattern mistakes, AMD chips, discordant to what we competence have heard, aren’t totally protected either.
In a posting. Mark Papermaster, AMD’s CTO, certified Google Project Zero (GPZ) Variant 1 (Bounds Check Bypass or Spectre) is germane to AMD processors. But, Papermaster wrote, “We trust this hazard can be contained with an handling complement (OS) patch and we have been operative with OS providers to residence this issue.”
Of course, there was usually one small problem with this fix: The initial Microsoft Windows 10 patch bricked some PCs using comparison AMD processors. Specifically these are Opteron, Athlon and AMD Turion X2 CPUs. Papermaster said, “We are operative closely with them to scold an emanate that paused a placement of rags for some comparison AMD processors (AMD Ultra families) progressing this week. We design this emanate to be corrected shortly and Microsoft should resume updates for these comparison processors by subsequent week.”
The genuine change in AMD’s position is with GPZ Variant 2 (Branch Target Injection or Spectre). AMD admits their processors might be attackable by this route, though “AMD’s processor architectures make it formidable to feat Variant 2.” So, out of an contentment of counsel AMD will be creation discretionary micro formula updates accessible to serve enclose a threat.
“AMD will also continue to work closely with a attention on this threat. We have tangible additional stairs by a multiple of processor microcode updates and OS rags that we will make accessible to AMD business and partners to serve lessen a threat.”
This will be finished initial by creation discretionary microcode updates for Ryzen and EPYC processors starting this week. They will follow this adult with updates accessible for prior era products over a entrance weeks. These updates will be supposing to users by complement providers and handling complement vendors.
Linux is already releasing AMD patches, while AMD is “working closely with Microsoft on a timing for distributing their patches. We are also enchanting closely with a Linux village on growth of “return trampoline” (Retpoline) program mitigations.”
GPZ Variant 3 (Meltdown) doesn’t impact AMD processors. As Thomas Lendacky, AMD program operative and Linux heart developer, wrote on a Linux Kernel Mailing List (LKML), “AMD processors are not theme to a forms of attacks that a heart page list siege underline protects against.” Therefore on AMD systems, sysadmins should invalidate this feature. If they don’t, their systems will humour from a system slack that comes with a Meltdown patches though improving security.
As for AMD’s Radeon GPUs, don’t worry about it. Radeon “architectures do not use suppositional execution and so are not receptive to these threats.”
So, yes, AMD processors are safer than a chip families — Intel, POWER, ARM — influenced by Meltdown. Just don’t assume they’re ideally safe. They’re not.
Finally, keep in mind we’re still in a early days of traffic with these essentially opposite confidence problems. We will see serve associated confidence problems popping up.
- Windows Meltdown-Spectre update: Some AMD PC owners post pile-up reports
- Major Linux distros have Meltdown patches, though that’s usually partial of a fix
- The Linux vs Meltdown and Spectre conflict continues