As Meltdown and Specter two serious kernel-level vulnerabilities caused by security incidents intensified, which is undeniable that, Linux servers powered by Intel processors have the most impact on the data center.
However, Intel's statement stressed that AMD will be affected.
In this regard, AMD official website has a statement on the line, to be clarified again.
AMD first wants everyone to understand two things:
1, The loopholes have not yet entered any public domain, that is, did not cause damage in the real world
2, all the characterization and destructive power of vulnerabilities are based on the laboratory level to make and confirm, at present can carry out these intrusion operations are experienced, familiar with the senior engineer of electronic engineering
AMD once again stressed that based on the Google Project Zero team's three attack simulation forms, AMD processors are completely immune to Form 3, virtually immune to Form 2 (theoretical attack, no successful simulation yet), and Form 1 can be replaced with an OS-level update without loss of performance.
Simultaneously, The father of Linux is also behind the Gihub AMD processors are not affected.
Because the Linux 4.15 (candidate) kernel fixes a Meltdown vulnerability that forces the x86 processor to make a kernel Page Table Isolation (KPTI or PTI) patch, resulting in noticeable performance degradation, Linus Torvalds has made a PTI correction on AMD processors.
Tom Lendacky, developer of the Linux kernel, also said to HOP, The AMD processor was compromised by Intel because the AMD processor does not allow memory-referenced operations due to architectural differences that would otherwise cause page faults and is therefore completely immune to the Meltdown vulnerability.
Meltdown vulnerabilities are currently fixed on Linux kernels 4.14, 4.9, 4.4, 3.16, 3.18, 3.12 LTS.