Overview At AMD, security is a top priority and we are continually working to ensure the safety of our users as new risks arise. Recent public disclosures have brought to the forefront the constant need to protect and secure data. This updates not showing up software center is a centralized location for the latest security-related updates as they relate to AMD.
Did not find what they wanted? Try here
CVE 2018-3646, due to our hardware paging architecture protections. Spectre security vulnerability was disclosed by MIT. AMD is working with the software ecosystem to mitigate variant 1. 1 through operating system updates where necessary. We have not identified any AMD x86 products susceptible to the Variant 1. AMD has also updated related portions of the Software Techniques for Managing Speculation on AMD Processors whitepaper.
For technical details, please see the AMD whitepaper. Based on the difficulty to exploit the vulnerability, AMD and our ecosystem partners currently recommend using the default setting that maintains support for memory disambiguation. We have not identified any AMD x86 products susceptible to the Variant 3a vulnerability in our analysis to-date. As a reminder, security best practices of keeping your operating system and BIOS up-to-date, utilizing safe computer practices and running antivirus software are always the first line of defense in maintaining device security. These mitigations require a combination of processor microcode updates from our OEM and motherboard partners, as well as running the current and fully up-to-date version of Windows. For Linux users, AMD recommended mitigations for GPZ Variant 2 were made available to our Linux partners and have been released to distribution earlier this year. AMD because of our processor design.