AMD issued as assertion as nicely, through which it says: “AMD is aware of new research claiming new speculative execution attacks that may allow access to privileged kernel data. Based on external and internal analysis, AMD believes it is not vulnerable to the SWAPGS variant attacks because AMD products are designed not to speculate on the new GS value following a speculative SWAPGS. For the attack that is not a SWAPGS variant, the mitigation is to implement our existing recommendations for Spectre variant 1.”
How SWAPGS works
SWAPGS is a Spectre-type exploit, which takes benefit of processors’ department prediction (predicting when to change instruction sequence to enhance efficiency). The processor speculates which instruction sequence is more than likely to run subsequent and prepares its inside states for that. When observing these directions, attainable delicate information may very well be revealed by observing timing outcomes.
SWAPGS comes into play as a result of it’s extra exploit below Spectre like behaviour. It is known as after x86-64 instruction referred to as SWAPGS which swaps the GS register (solely one in all section registers which construct full reminiscence handle), with worth supposed for use throughout kernel operations. Because of its nature, SWAPGS doesn’t carry out any form correction of knowledge it makes use of, thus an assault will be carried out. During the swapping interval, attacker may insert any worth with out getting errors or warning by processor.
Mitigations
As you realize, for Spectre and Meltdown, there aren’t too many no concrete mitigations which might be constructed into {hardware}, and the trade nonetheless largely will depend on software program/firmware-level mitigations that value efficiency. Only the latest processor fashions from AMD and Intel have {hardware} mitigations. For now Microsoft already pushed the replace to Windows OSes and kernel patches for any *nix based mostly OS ought to have been carried out as nicely.