SWAPGS (security vulnerability)

SWAPGS, also known as Spectre variant 1, is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors.[1][2][3] Most processors use a form of speculative execution, this feature allows the processors to make educated guesses about the instructions that will most likely need to be executed in the near future. This speculation can leave traces in the cache, which attackers use to extract data using a timing attack, similar to side-channel exploitation of Spectre.[4]

The Common Vulnerabilities and Exposures ID issued to this vulnerability is CVE-2019-1125.[5]

  1. ^ "SWAPGS Spectre Side-Channel Vulnerability: CISA". www.us-cert.gov. United States: United States Computer Emergency Readiness Team. 6 August 2019. Retrieved 2019-09-20.
  2. ^ "SWAPGS Attack". bitdefender.com. Bitdefender. 6 August 2019.
  3. ^ "SWAPGS speculative execution and speculative only segment loads CPU vulnerabilities /Support /SUSE". www.suse.com. SUSE Linux. Retrieved 2019-09-20.
  4. ^ "More information on SWAPGS and Speculative only Segment Loads". Intel.com. Intel. 6 August 2019.
  5. ^ "CVE-2019-1125". cve.mitre.org. United States: Mitre Corporation. Retrieved 2019-09-20.

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search