AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

AMD has identified a new side-channel attack called Transient Scheduler Attack (TSA) that affects various AMD chips and could lead to information disclosure. While the attack is complex and requires local access, security updates are recommended to mitigate potential risks. #AMD #TransientSchedulerAttack

Keypoints

  • The Transient Scheduler Attack (TSA) affects AMD desktop, mobile, and datacenter processors, including EPYC chips.
  • The attack exploits microarchitectural leaks involving the L1 cache and store queue, dubbed TSA-L1 and TSA-SQ.
  • The vulnerabilities require attacker-controlled code execution with low privileges but are difficult to carry out successfully.
  • The attack can potentially leak data from the OS kernel, applications, or virtual machines, with varying severity levels.
  • AMD recommends updating affected systems and using mitigation techniques like the VERW instruction, despite potential performance impacts.

Read More: https://www.theregister.com/2025/07/09/amd_tsa_side_channel/