AMD Warns Of Potential Spectre-Style Zen 3 Processor Security Vulnerability sweclockers.com Intel was raked over the coals three years ago when Spectre and Meltdown vulnerabilities were first discovered that could affect its consumer and enterprise processors. The company addressed the side-channel exploits with patches and subsequent hardware revisions, but AMD is now coming under the microscope for a side-channel attack that could affect processors based on its Zen 3 architecture... At this time, AMD has provided instructions via a security bulletin [PDF] on how to disable PSF, as it is enabled by default on Zen 3 processors. The company has also proposed a Linux patch to enable/disable the functionality. We'd assume that AMD is working with Microsoft on patches for Windows-based operating systems as well. However, since it has not yet seen any real-world attacks that have taken advantage of the PSF, AMD is recommending that most customers leave the feature enabled for now. We'd imagine that this could be due to a performance hit that might be realized when disabling the feature, but AMD didn't provide any guidance on that potential in its support document.