All of lore.kernel.org
 help / color / mirror / Atom feed
* Nethammer and kernel network drivers
@ 2018-06-02  3:46 procmem
  2018-06-02  9:43 ` Greg KH
  0 siblings, 1 reply; 7+ messages in thread
From: procmem @ 2018-06-02  3:46 UTC (permalink / raw)
  To: kernel-hardening

Hello. I wanted to get your attention about a new, more serious
reincarnation of rowhammer called nethammer that doesn't need to execut
any code on the system like in the past nor does it leave a trace.

The summary of the paper is that rowhammer can be
remotely triggered by feeding susceptible* network driver crafted
traffic. This attack can do all kinds of nasty things such as modifying
SSL certs on the victim system.

* Susceptible drivers are those relying on Intel CAT, uncached memory or
the clflush instruction.

In absence of hardware mitigations, please identify and disable/fix
susceptible network drivers to avoid this type of attack. Thanks.

**

[0] https://arxiv.org/abs/1805.04956

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2018-06-03 13:37 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-06-02  3:46 Nethammer and kernel network drivers procmem
2018-06-02  9:43 ` Greg KH
2018-06-02 13:57   ` procmem
2018-06-02 17:41     ` procmem
2018-06-03  6:31       ` Greg KH
2018-06-03 13:23         ` procmem
2018-06-03 13:37           ` Greg KH

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.