"While we believe that AMD's processor architectures make it hard to exploit Variant 2, we continue to work closely with the industry on this threat".
Nvidia detailed how through the use of a side channel cyber attack that exploits the speculative execution modern processors perform to deliver speedy performance, its GPU drivers could fall foul of Spectre variants.
AMD said in a statement after this story was initially published that there's been no change to its position on the susceptibility to the second variant of Spectre for its chips and only that it's rolling out optional updates to further contain the threat. It also maintained that Meltdown isn't applicable to AMD chips at all.More news: Mets agree to $39M, three-year deal with free agent Jay Bruce
More news: Manchester United to subsidise fans travelling to Sevilla
More news: Time to test for radon
Both Linux and Microsoft have started deploying operating system updates for this issue, albeit some Windows users reported BSOD errors earlier in the week, which led Microsoft to pause the rollout of the Spectre #1 patch for the time being. Since "no mitigation is required" for variant 3, it won't be creating a patch for the vulnerability.
While patches and updates are being issued across a broad spectrum of devices - and device hardware - no company has issued an all-clear just yet. Along with these patches comes the expectation of performance hits, and yesterday, Intel shared some benchmarks to show relative performance for a handful of recent Core i7 CPUs after its patches for Spectre and Meltdown were applied.
Both Microsoft and AMD have confirmed that they will be making the Meltdown and Spectre security updates available for Windows devices with AMD chips once again starting next week. "As for our driver software, we are providing updates to help mitigate the CPU security issue". The chipmaker also said it's working with Redmond to address a problem that delayed the distribution of patches for its older processors.