A few weeks ago, a new vulnerability called spoiler was discovered that affects these Intel core chips.
In this situation, AMD has published an article confirming that its chips are immune to “SPOILER”, which is a new processor vulnerability discovered by computer scientists at Worcester Polytechnic Institute and the University of Lübeck. As explained in their article, SPOILER uses “a weakness in Intel’s memory subsystem address speculation”. This makes it easier to perform memory attacks like “Rowhammer”, but of course only users with an Intel CPU have to worry.
“AMD is aware of the report of a new security attack called SPOILER, which can gain access to partial address information during the loading process. We believe that our products are not vulnerable to this problem due to our single processor architecture. The exploit SPOILER can access partial address information above address bit 11 during the load process. We believe that our products are not vulnerable to this problem because AMD processors in bit 11 do not use partial address mismatches to resolve load conflicts.”
In this way, AMD completely ignores that SPOILER affects its processor architecture because it simply doesn’t work like an Intel core at the process level and how information is interpreted.
We don’t know how dangerous this can be if a hacker tries to exploit the vulnerability. At the moment no attacks have been reported that exploit this, nor do we know when Intel will be able to fix it.