• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

AMD Confirms its Processors are Unaffected by RIDL and Fallout Vulnerabilities

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,670 (7.43/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
AMD in a statement confirmed that its processors are unaffected by the RIDL (Rogue In-Flight Data Load) and Fallout vulnerabilities. The company however worded its statement in CYA language, just to be safe. "...we believe our products are not susceptible to 'Fallout' or 'RIDL' because of the hardware protection checks in our architecture. We have not been able to demonstrate these exploits on AMD products and are unaware of others having done so," reads the AMD statement put out late Tuesday (14th May).

AMD came to these conclusions on the basis of its own testing and discussions with the researchers who discovered RIDL. It's important to note here, that the "Fallout" vulnerability AMD is referring to in this statement is the one which is part of four MDS vulnerabilities Intel disclosed yesterday, and not the identically named "Fallout" vulnerability discovered by CTS Labs in 2018, allegedly affecting secure memory management of AMD "Zen" processors.



View at TechPowerUp Main Site
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)
So, what if your processor is compromised and you compromise it further with the IME, how do you call that?
 
lel man sounds to me like the same thing :)
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)
lol at the attempt at obfuscation.

Intel CPU Dies should be round with the amount of corner cutting they have been doing.
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)

There is worst : your processors are affected by vulnerabilities and yet deliberately compromise it with a backdoor, then say these vulnerabilities can be avoided by lowering performance by 30%.
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)
Are you forgetting Intel Management Engine???
 
Why does MDS tool say SMT is vulnerable ? here Ryzen 1600x
 
Why does MDS tool say SMT is vulnerable ? here Ryzen 1600x

Simultaneous Multithreading is the name of the technology

Hyper Threading is just branding.
 
There is worst : your processors are affected by vulnerabilities and yet deliberately compromise it with a backdoor, then say these vulnerabilities can be avoided by lowering performance by 30%.

Please cite that 30% claim, and bear in mind that the performance impacts of the patches have REDUCED over time, restoring much of the lost performance.

Additionally, the worst performance regression I am aware of at ANY time, in any workload as a result of any Spectre/Meltdown patch was 24% impact - and that was specifically on one piece of software: postgres.

Since that time, there have been numerous new patches and revisions, and performance impact has been reduced in all cases, to either no impact at all (for most consumer tasks), or low single digit % hits for anything professional or datacentre.

Microsoft (not Intel) have also stated that their 1H-2019 Windows 10 patch will reduce the performance impact of all Spectre and Meltdown mitigations to "Noise level" - IE, low impact than could be explained by simple test variance, thus eliminating the issue related to those patches entirely. (Linux has had retpoline enabled for a few months now btw, so is also no longer significantly impacted by spectre patch performance regressions)

 
lol at the attempt at obfuscation.

Intel CPU Dies should be round with the amount of corner cutting they have been doing.
I genuinely love this answer :roll:
 
Please cite that 30% claim, and bear in mind that the performance impacts of the patches have REDUCED over time, restoring much of the lost performance.

Additionally, the worst performance regression I am aware of at ANY time, in any workload as a result of any Spectre/Meltdown patch was 24% impact - and that was specifically on one piece of software: postgres.

Since that time, there have been numerous new patches and revisions, and performance impact has been reduced in all cases, to either no impact at all (for most consumer tasks), or low single digit % hits for anything professional or datacentre.

Microsoft (not Intel) have also stated that their 1H-2019 Windows 10 patch will reduce the performance impact of all Spectre and Meltdown mitigations to "Noise level" - IE, low impact than could be explained by simple test variance, thus eliminating the issue related to those patches entirely. (Linux has had retpoline enabled for a few months now btw, so is also no longer significantly impacted by spectre patch performance regressions)

I'm thinking he's talking about disabling hyperthreading suggestion Intel gave for 7th gen or older processors. Obviously this is just my guess.
 
And I almost went for an i3 8100.
 
Are ham handed MS updates forcing the patch for Intel vulnerabilities on AMD systems?
 
Are ham handed MS updates forcing the patch for Intel vulnerabilities on AMD systems?
There's no way to confirm it, but that might be the case. Linus had a very heated discussion with Intel about the Linux kernel's mitigations during the first Spectre patches, he was screaming at Intel for trying to force the patch on all CPUs.
 
Last edited:
"We believe [...] . We have not been able to demonstrate [...]".
Well, its doesn't sound great, but it's good enough.
 
the most mega LOL news ever: advertise that your processors are not affected by vulnerabilities and yet deliberately compromise it with a backdoor (PSP)

There is no more evidence the PSP is a backdoor than the Intel ME.

They both are just really bad ideas.


Yeah, we aren't mac users but cool story bro.

There's no way to confirm it

Run MDS tool. You can confirm it and no, it looks like right now it needs a microcode command to enable mitigations. AMD is unlikely to release this command in it's AGESA since it does not appear to think it needs it. I believe them to be correct, but the world is crazy as of late.

Why does MDS tool say SMT is vulnerable ? here Ryzen 1600x

Probably looking at the Spectre flags. In which case: You probably are vulnerable. What AGESA?
 
Back
Top