- Joined
- Aug 20, 2006
- Messages
- 13,003
AMD has published a support article confirming its chips should be immune to “SPOILER,” a new CPU vulnerability outlined by computer scientists at Worcester Polytechnic Institute and the University of Lübeck. As explained in their paper, SPOILER takes advantage of "a weakness in the address speculation of Intel’s proprietary implementation of the memory subsystem.” This makes it easier for memory attacks such as “Rowhammer” to be carried out, but evidently, only Intel users need worry.
We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts.
We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts.