AMD's microprocessor products are equipped with memory controllers that adhere to the DDR specifications set by the industry. The vulnerability of these products to Rowhammer attacks is dependent on a variety of factors, including the DRAM device, its manufacturer, the technology employed, and the configuration of the system. AMD advises customers to consult with their DRAM or system manufacturers to assess the risk posed by this new variant of the Rowhammer attack.
To mitigate the risk of Rowhammer-style attacks, AMD continues to recommend several established DRAM security measures, such as:
AMD extends its gratitude to Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Boleskei, and Kaveh Razavi from ETH Zurich for their research and for engaging in a coordinated disclosure of these vulnerabilities.
Source: AMD