AMD Technical Intelligence Brief

2026-04-18 | CONFIDENTIAL β€” INTERNAL USE ONLY


Intelligence Brief

⚑ AMD Highlights

  • FP-DSS (Floating Point Divider State Sampling) vulnerability disclosed for Zen 1/Zen 1+ only; Linux kernel patch already merged into Linux 7.1 with stable backports in progress β€” mitigation is a single MSR bit flip, minimal performance impact expected.

βš”οΈ Competitive Watch

No competitor developments in today’s feed.

🌐 Industry Signals

No broad industry signals in today’s feed.


πŸ”² Hardware & Products

AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched

Source: Phoronix Β· 2026-04-18

What happened: AMD publicly disclosed FP-DSS, a transient execution vulnerability in Zen 1/Zen 1+ processors allowing a local, user-privileged attacker to leak data via floating point divisor units. The Linux kernel mitigation (set MSR C001_1028 bit 9) is already merged in Linux 7.1; stable kernel backports are pending.

Why it matters to AMD:

  • Blast radius is narrow β€” Zen 1/Zen 1+ only (Ryzen 1000-series, first-gen EPYC Naples); Zen 2 and newer are unaffected, protecting the entire current EPYC/Ryzen product lineup from any cloud or enterprise customer concern.
  • Response posture is strong β€” patch-ready at disclosure with a lightweight, no-microcode-update mitigation minimizes the operational burden on enterprise Linux customers and avoids the performance regression narratives that plagued earlier industry CVE responses (e.g., Spectre/Meltdown).
  • Action required: Datacenter/cloud accounts still running Naples-generation EPYC should be proactively flagged by field teams; coordinate with OS vendors (RHEL, SLES, Ubuntu) to confirm stable kernel backport timelines and provide customers a clear remediation path before this gains media traction.