• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

AMD CPUs Immune to SPOILER Vulnerability: Company Statement

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,670 (7.43/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
SPOILER, short for Speculative Load Hazards Boost Rowhammer and Cache Attacks (not sure how that abbreviates), is the latest in the long line of security vulnerabilities preying on imperfections in speculative-execution capabilities of modern processors, which surfaced early March, and affects all Intel processors. The vulnerability exploits the speculative nature of loading data from main memory to a CPU register. Intel has yet to assign a CVE to SPOILER, and hasn't yet released its own documentation on possible mitigation.

Meanwhile, rival AMD put out a statement that its processors are inherently immune to SPOILER due to a fundamentally different memory management design. "We are aware of the report of a new security exploit called SPOILER which can gain access to partial address information during load operations. We believe that our products are not susceptible to this issue because of our unique processor architecture. The SPOILER exploit can gain access to partial address information above address bit 11 during load operations. We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts," the company writes in its statement.



View at TechPowerUp Main Site
 
Good to know.
 
More proofs that AMD CPUs offer LESS features compared to Intel's CPUs.
More proofs that AMD CPUs are incompatible with a number of applications, like malwares in this certain case.

:p
 
More proofs that AMD CPUs offer LESS features compared to Intel's CPUs.
More proofs that AMD CPUs are incompatible with a number of applications, like malwares in this certain case.

:p

I hope this is the death knell for the bastards. Let it kill performance to fix (disable HT right?). I want to see that stock tank and every OEM jump ship on server to Rome.
 
Let's hope their PR department consulted their security team this time around…

More proofs that AMD CPUs are incompatible with a number of applications, like malwares in this certain case.
We are talking about hardware defects and timing attacks here, it has nothing to do with software compatibility.

I hope this is the death knell for the bastards. Let it kill performance to fix (disable HT right?).
HT itself is not a problem, but it does complicate things. It's a matter of time before they have to drop HT, as the complications continue to grow while the gains of HT continues to decline. Unfortunately I fear Intel (and AMD) will continue to design for HT for a couple of iterations more.
 
Good on AMD for stating the "why" instead of just saying "trust us" as another company says (oh and not cutting corners...)

"We believe that our products are not susceptible to this issue because AMD processors do not use partial address matches above address bit 11 when resolving load conflicts,"
 
Back
Top