News AMD Rolls Out Patches To Disable Predictive Store Forwarding on Zen 3 CPUs

meanwhile Spector and Spector like viruses still plague intel; and it took AMD < week to fix the problem.
The report about the vulnerability apparently came from AMD's own engineers, so there's no telling how long they actually knew about it. It could have potentially been something they knew about since before the 5000-series even launched, and they may have just not reported on it until a fix was ready.

It doesn't sound all that critical though, and the performance hit from the optional patch appears to be imperceptible based on initial reports, so it doesn't seem to be nearly as bad as some of the Intel exploits.
 
meanwhile Spector and Spector like viruses still plague intel; and it took AMD < week to fix the problem.

It is arguable that Intel deliberately left the Vulnerabilities in to allow agencies like the CIA and FBI , direct access to the CPU to spy. It would be easy to fix the problems with a Kernel fix, but they simply didn't want to.
For a start, predictive branch execution pipelines allow a non-user controlled environment that is rife to be exploited, however it also has a hit on the performance, which can be both negative and positive. Personally, as a digital designer, I always think that direct execution pipelines, would be a better performance enhancer, than something that can get things both right and wrong. Predictive coding requires AI which is Transistor count intensive and completely unnecessary.