Bitdefender disclosed a new variant of the Spectre 1 speculative execution side channel vulnerabilities that could allow a malicious program to access and read the contents of privileged memory in an operating system. The SWAPGS vulnerability allows local programs, like malware, to read data from memory that is should normally not have access to, such as the Windows or Linux kernel memory. Microsoft secretly patched the vulnerability in July 2019 Patch Tuesday security updates using software mitigations. Microsoft, Intel, Red Hat, and Red Hat all state that this vulnerability exists in all modern CPUs.
Source: https://www.bleepingcomputer.com/news/security/swapgs-vulnerability-in-modern-cpus-fixed-in-windows-linux-chromeos/

