AMD sobre Meltdown:
Variant 1 "Bounds Check Bypass": Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant 2 "Branch Target Injection": Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant 3: "Rogue Data Cache Load": Zero AMD vulnerability due to AMD architecture differences.