haunting continues: SWAPGS

By: hobold (hobold.delete@this.vectorizer.org), August 7, 2019 1:42 am
Room: Moderated Discussions
Yet another speculative leak. They seem to get more specific and niche as time goes by, though. This one requires assistance from known kernel instruction sequences (already fixed before publication of this vulnerability):

https://dunia-it.com/swapgs-vulnerability-in-modern-cpus-fixed-in-windows-linux-chromeos/

Thus far the leak was demonstrated on Intel processors. AMD Zen* is not yet known to be safe; only very old AMD hardware has been verified to not speculatively execute SWAPGS.

(This one has been found by a maker of commercial antivirus software. It has been a bit difficult to find a source that contains more information than marketing.)
 Next Post in Thread >
TopicPosted ByDate
haunting continues: SWAPGShobold2019/08/07 01:42 AM
  haunting continues: SWAPGSanon2019/08/07 03:18 AM
    haunting continues: SWAPGSanon2019/08/07 03:28 AM
    haunting continues: SWAPGSLinus Torvalds2019/08/07 02:51 PM
Reply to this Topic
Name:
Email:
Topic:
Body: No Text
How do you spell green?