AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched

AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched

Phoronix
PhoronixApr 18, 2026

Key Takeaways

  • FP-DSS bug impacts AMD Zen 1 and Zen 1+ CPUs
  • Vulnerability allows privileged user to leak data via floating-point divider
  • Linux kernel patch sets MSR C001_1028 bit 9 to mitigate
  • Patch back‑ported to stable kernels, protecting legacy Ryzen and EPYC
  • AMD rates risk low; FP ops rarely used in privileged code

Pulse Analysis

The FP‑DSS (Floating Point Divider State Sampling) flaw underscores how even mature microarchitectures can harbor subtle transient‑execution bugs. Discovered by independent security researchers, the vulnerability exploits the floating‑point divisor unit to infer internal state, a technique reminiscent of Spectre‑style attacks but specific to AMD's Zen 1 design. While the attack surface is limited to locally‑privileged users, the potential to exfiltrate cryptographic keys or other sensitive buffers makes it a noteworthy addition to the growing catalog of hardware‑level exploits that challenge traditional software defenses.

Linux’s response was swift: a kernel patch introduced in the 7.1 development branch sets bit 9 of model‑specific register C001_1028, effectively disabling the vulnerable divider path for untrusted contexts. The change is lightweight, requiring only a single MSR write at boot, and will be back‑ported to the 5.15, 5.10 and other long‑term support kernels. System administrators of legacy Ryzen 1000 series workstations or EPYC 7001 servers can apply the update without firmware upgrades, preserving performance while sealing the leak vector.

Beyond the immediate fix, the FP‑DSS episode highlights the ongoing tension between hardware innovation and security assurance. AMD’s public bulletin and the open‑source community’s rapid mitigation illustrate a collaborative model that can reduce exposure windows for older silicon. As enterprises continue to run mixed‑generation fleets, vendors and OS maintainers must prioritize transparent disclosure and timely patches to safeguard data integrity across the full product lifecycle.

AMD FP-DSS Security Bug For Zen 1 CPUs Made Public, Linux Kernel Patched

Comments

Want to join the conversation?