Release date:
Updated on:
Affected Systems:
AMD CPU
Description:
--------------------------------------------------------------------------------
AMD is an integrated circuit supplier that provides various chip products for the computer, communication and electronic consumer markets, these include microprocessor, Flash, and silicon wafer-based solutions for communication and network devices.
Some AMD processors have security vulnerabilities in the implementation of segmentation and fill_sons_in_loop code. The stack pointer update error can be caused by a specific continuous back-to-back pops and return command sequence.
<* Source: Matthew Dillon
Link: http://article.gmane.org/gmane. OS .dragonfly-bsd.kernel/14518
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
AMD
---
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Www.amd.com/cn