When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
amd ryzen_pro_5650g_firmware - |
||
amd ryzen_pro_5650ge_firmware - |
||
amd ryzen_pro_5750g_firmware - |
||
amd ryzen_pro_5750ge_firmware - |
||
amd ryzen_pro_5350g_firmware - |
||
amd ryzen_pro_5350ge_firmware - |
||
amd ryzen_pro_4750g_firmware - |
||
amd ryzen_pro_4750ge_firmware - |
||
amd ryzen_pro_4650g_firmware - |
||
amd ryzen_pro_4650ge_firmware - |
||
amd ryzen_pro_4350g_firmware - |
||
amd ryzen_pro_4350ge_firmware - |
||
amd ryzen_pro_3900_firmware - |
||
amd ryzen_pro_3700_firmware - |
||
amd ryzen_pro_3600_firmware - |
||
amd ryzen_pro_3400g_firmware - |
||
amd ryzen_pro_3400ge_firmware - |
||
amd ryzen_pro_3350g_firmware - |
||
amd ryzen_pro_3200g_firmware - |
||
amd ryzen_pro_3200ge_firmware - |
||
amd ryzen_pro_2400g_firmware - |
||
amd ryzen_pro_2400ge_firmware - |
||
amd ryzen_pro_2200g_firmware - |
||
amd ryzen_pro_2200ge_firmware - |
||
amd ryzen_threadripper_pro_3995wx_firmware - |
||
amd ryzen_threadripper_pro_3975wx_firmware - |
||
amd ryzen_threadripper_pro_3955wx_firmware - |
||
amd ryzen_threadripper_pro_3945wx_firmware - |
||
amd athlon_gold_pro_3150g_firmware - |
||
amd athlon_gold_pro_3150ge_firmware - |
||
amd athlon_silver_pro_3125ge_firmware - |
||
amd athlon_pro_300ge_firmware - |
||
amd athlon_pro_200ge_firmware - |
||
amd ryzen_threadripper_3990x_firmware - |
||
amd ryzen_threadripper_3970x_firmware - |
||
amd ryzen_threadripper_3960x_firmware - |
||
amd ryzen_threadripper_2990wx_firmware - |
||
amd ryzen_threadripper_2970wx_firmware - |
||
amd ryzen_threadripper_2950x_firmware - |
||
amd ryzen_threadripper_2920x_firmware - |
||
amd ryzen_threadripper_1950x_firmware - |
||
amd ryzen_threadripper_1920x_firmware - |
||
amd ryzen_threadripper_1900x_firmware - |
||
amd ryzen_5950x_firmware - |
||
amd ryzen_5800x3d_firmware - |
||
amd ryzen_5900x_firmware - |
||
amd ryzen_5800x_firmware - |
||
amd ryzen_5600x_firmware - |
||
amd ryzen_5700g_firmware - |
||
amd ryzen_5600g_firmware - |
||
amd ryzen_5700ge_firmware - |
||
amd ryzen_5600ge_firmware - |
||
amd ryzen_5300g_firmware - |
||
amd ryzen_5300ge_firmware - |
||
amd ryzen_4700g_firmware - |
||
amd ryzen_4600g_firmware - |
||
amd ryzen_4300g_firmware - |
||
amd ryzen_4700ge_firmware - |
||
amd ryzen_4600ge_firmware - |
||
amd ryzen_4300ge_firmware - |
||
amd athlon_3150ge_firmware - |
||
amd athlon_3150g_firmware - |
||
amd athlon_3050ge_firmware - |
Get our weekly newsletter Chip biz's fix involves performance-inhibiting LFENCE, if warranted
Computer scientists at TU Dresden in Germany have found that AMD's Zen processor family is vulnerable to a data-bothering Meltdown-like attack after all. Exploiting this weakness is an academic exercise, it seems; there are more practical and easier ways for malware and malicious users to interfere with systems. If anything, it reminds us that modern CPU architectures have all kinds of side-channels, with some probably still left to find. In a paper [PDF] titled "Transient Execution of Non-Canon...