A point of criticism about these technologies is that AMD and Intel largely keep their inner workings a secret, presumably to make it more difficult for hackers to root out and exploit any vulnerabilities with such deep access to the CPU and its subsystems. There have been efforts to learn more about them, like the PSPTool that Joel Hruska at
ExtremeTech wrote about a couple of years ago.
Suffice to say, if AMD rolls out an update to patch critical security flaws within its PSP, you should get it (presuming you own an AMD system). As our friends at
Tom's Hardware note, this could potentially refer to one or both vulnerabilities AMD mentions on its
product security portal, that affect all Ryzen chips.
One of them is titled
Speculative code store bypass and floating-point value injection, which if exploited, could leak data that is supposed to be kept away from prying eyes. The other is
Transient execution of non-canonical accesses, another flaw that could result in unwanted data leakage.
To be clear, AMD does not mention these specific vulnerabilities in its release notes, so it's possible that the security fixes are entirely unrelated. Even if that is the case, however, whatever exploit the chipset driver targets is deemed "critical," so you'd still be wise to grab the update package.
The new chipset driver (
version 3.08.17.735) also updates AMD's MicroPEP driver with some bug fixes. This assists with managing transitions between power states and clock speeds.
Multiple users on
Reddit claim to have already received the same updated PSP driver in this chipset package, from Windows Update. Still, it doesn't hurt to install AMD's chipset driver package, though you may wish to uninstall your current chipset driver first.