AMD Warns of New Meltdown, Spectre-like Bugs Affecting CPUs (theregister.com)
(Thursday July 10, 2025 @03:00AM (msmash)
from the PSA dept.)
AMD is warning users of [1]a newly discovered form of side-channel attack affecting a broad range of its chips that could lead to information disclosure. Register:
> Akin to [2]Meltdown and Spectre , the Transient Scheduler Attack (TSA) comprises four vulnerabilities that AMD said it discovered while looking into a Microsoft report about microarchitectural leaks.
>
> The four bugs do not appear too venomous at face value -- two have medium-severity ratings while the other two are rated "low." However, the low-level nature of the exploit's impact has nonetheless led Trend Micro and CrowdStrike to assess the threat as "critical."
>
> The reasons for the low severity scores are the high degree of complexity involved in a successful attack -- AMD said it could only be carried out by an attacker able to run arbitrary code on a target machine. It affects AMD processors (desktop, mobile and datacenter models), including 3rd gen and 4th gen EPYC chips -- the full [3]list is here .
[1] https://www.theregister.com/2025/07/09/amd_tsa_side_channel/
[2] https://tech.slashdot.org/story/18/01/04/0131239/googles-project-zero-team-discovered-critical-cpu-flaw-last-year
[3] https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html
> Akin to [2]Meltdown and Spectre , the Transient Scheduler Attack (TSA) comprises four vulnerabilities that AMD said it discovered while looking into a Microsoft report about microarchitectural leaks.
>
> The four bugs do not appear too venomous at face value -- two have medium-severity ratings while the other two are rated "low." However, the low-level nature of the exploit's impact has nonetheless led Trend Micro and CrowdStrike to assess the threat as "critical."
>
> The reasons for the low severity scores are the high degree of complexity involved in a successful attack -- AMD said it could only be carried out by an attacker able to run arbitrary code on a target machine. It affects AMD processors (desktop, mobile and datacenter models), including 3rd gen and 4th gen EPYC chips -- the full [3]list is here .
[1] https://www.theregister.com/2025/07/09/amd_tsa_side_channel/
[2] https://tech.slashdot.org/story/18/01/04/0131239/googles-project-zero-team-discovered-critical-cpu-flaw-last-year
[3] https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html