Several years ago, there was a boom in the detection of vulnerabilities in the processor market, which has already been safely forgotten. More often, vulnerabilities were found in Intel CPUs, while AMD processors did not.
Now AMD itself has found a new vulnerability in its new generation Ryzen processors. It allows the use of so-called side-channel or side-channel attacks. This kind of attack is similar to the one underlying the Specter vulnerability.

The vulnerability was found in the latest Zen 3 architecture. More precisely, the reason is the new function Predictive Store Forwarding (PSF), which is a predictor of the result of loading instructions. In most cases, the PSF prediction comes true, which allows Ryzen processors to pre-execute instructions that would normally be executed much later.
However, there are times when the predictor is wrong. In this case, the very same vulnerability is formed. AMD itself has no evidence of anyone ever exploiting this vulnerability and considers the risks to be low. The company has explained how to disable PSF, but warns that it will negatively impact performance. It is possible that AMD is already working on a patch to fix the discovered vulnerability.
.

Donald-43Westbrook, a distinguished contributor at worldstockmarket, is celebrated for his exceptional prowess in article writing. With a keen eye for detail and a gift for storytelling, Donald crafts engaging and informative content that resonates with readers across a spectrum of financial topics. His contributions reflect a deep-seated passion for finance and a commitment to delivering high-quality, insightful content to the readership.