AMD CPUs May Transiently Execute Beyond Unconditional Direct Branch
Bulletin ID: AMD-SB-1026
Potential Impact: Data leakage
Severity: Medium
Summary
AMD is providing an update for one recommended mitigation, mitigation G-5, in the “Software Techniques for Managing Speculation on AMD processors” white paper. Mitigation G-5 helps address potential vulnerabilities associated with speculative behavior of branch instructions.
AMD processors may transiently execute instructions following an unconditional direct branch that may result in detectable cache activity.
AMD is not aware of any active exploits in the wild that use this potential security vulnerability to exploit AMD products.
CVE Details
CVE-2021-26341
Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
Affected Products
Desktop
- AMD Athlon™ X4 processor
- AMD Ryzen™ Threadripper™ PRO processor
- 2nd Gen AMD Ryzen™ Threadripper™ processors
- 3rd Gen AMD Ryzen™ Threadripper™ processors
- 7th Generation AMD A-Series APUs
- AMD Ryzen™ 2000 Series Desktop processors
- AMD Ryzen™ 3000 Series Desktop processors
- AMD Ryzen™ 4000 Series Desktop processors with Radeon™ graphics
Mobile
- AMD Ryzen™ 2000 Series Mobile processor
- AMD Athlon™ 3000 Series Mobile processors with Radeon™ Graphics
- AMD Ryzen™ 3000 Series Mobile processors or 2nd Gen AMD Ryzen™ Mobile processors with Radeon™ graphics
- AMD Ryzen™ 4000 Series Mobile processors with Radeon™ graphics
- AMD Ryzen™ 5000 Series Mobile processors with Radeon™ graphics
Chromebook
- AMD Athlon™ Mobile processors with Radeon™ graphics
Server
- 1st Gen AMD EPYC™ processors
- 2nd Gen AMD EPYC™ processors
Mitigation
AMD has provided guidance via an updated paper located here: https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf
Acknowledgement
AMD thanks Pawel Wieczorkiewicz from grsecurity for reporting this issue.
References
https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf
Revisions
Revision Date |
Description |
03/08/2022 |
Initial publication |
DISCLAIMER
The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.
AMD, the AMD Arrow logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.
© 2022 Advanced Micro Devices, Inc. All rights reserved.