News: 2026-04-18
April 18, 2026 Β· Generated 07:39 AM PT
AMD Technical Intelligence Brief
2026-04-18 | CONFIDENTIAL β INTERNAL USE ONLY
Intelligence Brief
β‘ AMD Highlights
- FP-DSS (Floating Point Divider State Sampling) vulnerability disclosed for Zen 1/Zen 1+ only; Linux kernel patch already merged into Linux 7.1 with stable backports in progress β mitigation is a single MSR bit flip, minimal performance impact expected.
βοΈ Competitive Watch
No competitor developments in todayβs feed.
π Industry Signals
No broad industry signals in todayβs feed.
π² Hardware & Products
AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched
Source: Phoronix Β· 2026-04-18
What happened: AMD publicly disclosed FP-DSS, a transient execution vulnerability in Zen 1/Zen 1+ processors allowing a local, user-privileged attacker to leak data via floating point divisor units. The Linux kernel mitigation (set MSR C001_1028 bit 9) is already merged in Linux 7.1; stable kernel backports are pending.
Why it matters to AMD:
- Blast radius is narrow β Zen 1/Zen 1+ only (Ryzen 1000-series, first-gen EPYC Naples); Zen 2 and newer are unaffected, protecting the entire current EPYC/Ryzen product lineup from any cloud or enterprise customer concern.
- Response posture is strong β patch-ready at disclosure with a lightweight, no-microcode-update mitigation minimizes the operational burden on enterprise Linux customers and avoids the performance regression narratives that plagued earlier industry CVE responses (e.g., Spectre/Meltdown).
- Action required: Datacenter/cloud accounts still running Naples-generation EPYC should be proactively flagged by field teams; coordinate with OS vendors (RHEL, SLES, Ubuntu) to confirm stable kernel backport timelines and provide customers a clear remediation path before this gains media traction.