AMD Confirms that their products are not Impacted by SPOILER – Ryzen is Safe, For Now
AMD Confirms that their products are not Impacted by SPOILER – Ryzen is Safe, For Now
At the time of writing, SPOILER is only known to impact Intel Core processors or newer, though the original report on the vulnerability had only tested an AMD FX series processor, making it possible that Ryzen could be affected by SPOILER-based attacks.Â
Now, AMD has released a statement regarding SPOILER, which supposedly comes after the company conducted some in-house testing with the exploit. AMD is convinced that their processors are not susceptible to SPOILER, citing their “unique processor architecture”, confirming initial reports that claimed that the bug was Intel-specific.
Why are AMD’s processors immune to SPOILER? To simplify things a little, we can say that AMD’s processors do not make use of the address information that SPOILER exploits, making the exploit, at least in its current form, unusable on AMD CPUs. This means that AMD’s Ryzen CPUs are safe from SPOILER.Â
Below is AMD’s full announcement regarding SPOILER, which is worded in uncertain terms for legal reasons.
   We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture.
The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts.Â
More information about SPOILER is available to read here.
You can join the discussion on AMD’s apparent immunity to SPOILER on the OC3D Forums. Â