Text size

[Adds additional commentary by AMD following Intel's press conference.]

Intel (INTC) and Advanced Micro Devices (AMD) continue to respond to reports today of a chip flaw in Intel's parts that could pose security risks.

To recap, an article overnight by The Register said the company has a flaw in its chips that it is working to address. The report pressured Intel shares today, even though Intel refuted what it called "inaccurate media reports."

Intel will host a conference call on the matter starting at 5pm, Eastern time, this evening.

For its part, even though the Register piece seemed to absolve AMD of any issues, the company this afternoon decided to put out a statement on the matter.

AMD said through a spokesperson:

There is a lot of speculation today regarding a potential security issue related to modern microprocessors and speculative execution. As we typically do when a potential security issue is identified, AMD has been working across our ecosystem to evaluate and respond to the speculative execution attack identified by a security research team to ensure our users are protected.

To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD’s architecture, we believe there is a near zero risk to AMD processors at this time. We expect the security research to be published later today and will provide further updates at that time.

Update: Following Intel's press conference Wednesday evening, in which it discussed in some detail the various security threats to x86 processors, first uncovered by Alphabet's (GOOGL) Google's Project Zero, AMD issued a follow-up statement in email clarifying its position, noting there are some cases where an AMD chip could be affected.

AMD notes that the Google researchers actually found three different variants of what's being referred to as the "speculative execution vulnerability."

In the case of the first, "bounds check bypass," AMD said that it is "resolved by software / OS updates with negligible performance impact."

In the case of the second, "branch target injection," AMD said that "differences in AMD architecture mean there is a near zero risk," adding "vulnerability to Variant 2 has not been demonstrated on AMD processors to date."

In case three, "rogue data cache load," AMD said "zero AMD vulnerability or risk because of AMD architecture differences."