AMD Confirms that Ryzen CPUs are Immune to SPOILER Exploit

Published by

teaser

Two weeks ago new vulnerabilities for Intel procs surfaced. The vulnerability was given the name Spoiler and was discovered by the Worcester Polytechnic Institute and the University of Lübeck. It involves a leak in page mapping of working memory, making other attacks much easier to perform.



Intel has was notified of the problem on December 1st. According to the researchers, a solution via a software update is virtually impossible and can only be remedied with an adjustment in architecture. If this is done, it will undoubtedly lead to lower performance. Whether there is a solution is very doubtful. Arm and AMD processors are not vulnerable to this attack, however they never confirmed that. 

AMD has since responded officially and confirms that their Ryzen CPUs are immune from the threat.

We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts. 

 

Img_0625

AMD Confirms that Ryzen CPUs are Immune to SPOILER Exploit


Share this content
Twitter Facebook Reddit WhatsApp Email Print