Speculative Dereferencing of Registers

Updated -

Red Hat is responding to a computer microprocessor hardware (microarchitecture) issue similar to Spectre and Meltdown, known as Speculative Dereferencing of Registers.

This flaw appears to affect various microprocessor architectures like x86, ARM, and IBM PPC. Under certain conditions, this flaw allows unprivileged attackers to bypass memory security restrictions, potentially gaining access to data stored in memory that would otherwise be inaccessible.

Speculative Dereferencing of Registers in the kernel space is a hardware issue similar to Spectre V2. This issue leverages speculative execution to fetch memory addresses pointed to by the registers into CPU caches.

Red Hat is currently working with the upstream community, industry partners, and researchers to understand the impact further. We will update the guidance as we gain a better understanding of this issue. 

Red Hat recommends that previously released default mitigations for L1TF and Spectre remain enabled. See previous articles for more details. 

References

Comments