AMD Information for VU#649219
SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware
No statement is currently available from the vendor regarding this vulnerability.
Systems using AMD CPUs are not vulnerable to this privilege escalation. AMD have issued the following statement:
AMD processors' SYSRET behavior is such that a non-canonical address in RCX does not generate a #GP while in CPL0. We have verified this with our architecture team, with our design team, and have performed tests that verified this on silicon. Therefore, this privilege escalation exposure is not applicable to any AMD processor.
This statement comes from the Xen security advisory.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.