Eliminate CPU vulnerabilities! AMD: BIOS updates for Ryzen and EPYC platforms released this week

Today, AMD CTOMark Papermaster updated the "AMD Processor Security Notes" (Chinese page is not yet online).

Specifically, For V1 in the Specter Vulnerability (bypassing the boundary check) , AMD still believes it can be resolved by operating system and software updates.

In the 'change brick' that is caused by system startup failure to stop the AMD platform patch update, Microsoft has now resumed the Update operation AMD revealed that the affected platforms include the AMD Opteron / Athlon / Turion X2 Ultra.

As for Linux, the kernel and branch vendors have already started to update.

For V2 in the Specter Vulnerabilities (Branch Target Injection) , AMD said that although they still think that based on the different architectural design, to achieve the attack will be more difficult, but for absolute security considerations, The processor microcode will be updated (Editor's Note: The final will be converted to BIOS updates).

One Ryzen and EPYC processor platform motherboard BIOS will be on the line this week , Other products will be gradually released in the coming weeks.

For Meltdown vulnerability, which is V3 (malicious data cache load), AMD believes it is still completely immune and does not require any patches.

However, it is interesting that this time, AMD only made no mention of the performance impact of the patch.


The picture is AMD's first statement

2016 GoodChinaBrand | ICP: 12011751 | China Exports