Office

Amd continues to fight to mitigate specter and variants of this exploit

Table of contents:

Anonim

AMD announced today, through a security blog written by its own Mark Papermaster, that they are starting to roll out patches and resources for AMD processors affected by Specter exploits.

AMD continues to fight off Specter, but claims its CPUs are invulnerable to Meltdown

In the blog post, AMD reiterates how exploits based on Specter version 1 (GPZ 1 - Google Project Zero Flaw 1) have already been fixed by AMD partners. At the same time, AMD reiterates how its processors are invulnerable to Meltdown (GPZ3) attacks, and explains how the next patches for GPZ2 (Specter) will arrive.

The following mitigations for Specter require a combination of processor microcode updates by original equipment manufacturers and motherboard partners, as well as running a current, fully updated version of Windows. For Linux users, AMD-recommended patches for GPZ Variant 2 were made available to Linux partners and were released by distributions earlier this year.

The Sunnyvale company admitted that Specter Variant 2 will be difficult to patch, but said they have nonetheless worked with customers and partners to provide full coverage of the problem, through a “combination of operating system patches and microcode updates. of AMD processors to further mitigate the risk . " There is a PDF document detailing AMD-recommended patches for Windows, as well as links to all updates at the following link.

Techpowerup font

Office

Editor's choice

Back to top button