AMD posted the following statement on its website
AMD responded to the publication of these security vulnerabilities via a security advisory on its website, acknowledging the security exploits and stating they were not a new form of side-channel attack.
“We are aware of a new white paper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way,” AMD said.
“The researchers then pair this data path with known and mitigated software or speculative execution side-channel vulnerabilities. AMD believes these are not new speculation-based attacks.”
AMD said it recommended users follow the steps be taken by users to help mitigate against side-channel attacks:
- Keep your operating system up-to-date by operating at the latest version revisions of platform software and firmware, which include existing mitigations for speculation-based vulnerabilities
- Following secure coding methodologies
- Implementing the latest patched versions of critical libraries, including those susceptible to side-channel attacks
- Utilizing safe computer practices and running antivirus software
The advisory does not point to any mitigations for the attack in question, merely citing other mitigated speculative executions that were used as a vehicle to attack the L1D cache predictor.
The Graz University of Technology performed a lot of Vulnerability tests ion the past, but the reality is also that they are partially funded by intel, it seems. The paper mentions this, and really, just read it: "Additional funding was provided by generous gifts from Intel. Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding parties." Albeit a curiosity, the co-authors of the Intel-funded study also revealed Intel's vulnerabilities in the past.