Article Number
PA-220

AMD is aware of the latest research published claiming new speculative execution attacks. AMD believes it is not vulnerable to some of these attacks because of the hardware paging architecture protections in AMD devices and, for those that are not solved by paging architecture protections, the mitigation is to implement our existing recommendations.

Specific recommendations by published description:

New Variants of Spectre v1 – AMD believes existing mitigations apply

  • Pattern History Table - Cross Address - Out of Place (PHT-CA-OP)
  • Pattern History Table - Cross Address - In Place (PHT-CA-IP)
  • Pattern History Table - Same Address - Out of Place (PHT-SA-OP)

New Variants of Spectre v2 – AMD believes existing mitigations apply

  • Branch Target Buffer - Same Address - In Place (BTB-SA-IP)
  • Branch Target Buffer - Same Address - Out of Place (BTB-SA-OP)

New Variant of Meltdown

  • Meltdown-BK – AMD believes this does not affect its platforms because AMD does not have this feature in its products

New Variant of Spectre v1 – referred by researchers as a Meltdown variant

  • Meltdown-BD – AMD believes 32-bit systems using the BOUND instruction are impacted, but that existing Spectre v1 counter measures are effective