AMD: CPU security patch for Ryzen and EPYC processors come on this week
Today, AMD CTO Mark Papermaster updated “AMD Processor Security Notes” that includes the plant to fix Spectre and Meltdown vulnerability.
Specifically, for V1 in the specter vulnerability (Bounds Check Bypass or Spectre), AMD still believes it can be resolved with operating system and software level updates.
In the “change brick” that is caused by system startup failure to stop the update to the AMD platform patch, Microsoft has now resumed the Update operation. AMD revealed that the affected platforms include the AMD Opteron/Athlon /Turion X2 Ultra.
As for Linux, the kernel and branch vendors have already started to update.
For V2 (Branch Target Injection or Spectre) in the Specter Vulnerability, AMD said that although they still think it harder to implement an attack based on an architectural design, for absolute security, microcode updates, and OS patches that we will make available to AMD customers and partners to further mitigate the threat.
Which Ryzen and EPYC processor will be available this week, other products in the next few weeks will be gradually released.
For the Meltdown vulnerability, which is known as V3 (Rogue Data Cache Load or Meltdown), AMD believes it is still fully immune and does not require any patching.
However, it is interesting that this time, AMD only made no mention of the performance impact of the patch.