All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] Virtio-net drivers immune to Nethammer?
@ 2018-05-21 23:24 procmem
  2018-06-01 11:34 ` Stefan Hajnoczi
  0 siblings, 1 reply; 8+ messages in thread
From: procmem @ 2018-05-21 23:24 UTC (permalink / raw)
  To: qemu-devel, whonix-devel



Hi I'm a privacy distro maintainer investigating the implications of the
newly published nethammer attack [0] on KVM guests particularly the
virtio-net drivers. The summary of the paper is that rowhammer can be
remotely triggered by feeding susceptible* network driver crafted
traffic. This attack can do all kinds of nasty things such as modifying
SSL certs on the victim system.

* Susceptible drivers are those relying on Intel CAT, uncached memory or
the clflush instruction.

My question is, do virtio-net drivers do any of these things?

***

[0] https://arxiv.org/abs/1805.04956

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2018-06-03 16:10 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-05-21 23:24 [Qemu-devel] Virtio-net drivers immune to Nethammer? procmem
2018-06-01 11:34 ` Stefan Hajnoczi
2018-06-01 13:15   ` procmem
2018-06-01 15:58     ` Michael S. Tsirkin
2018-06-01 18:54       ` Dr. David Alan Gilbert
2018-06-02  3:04         ` procmem
2018-06-02  3:08       ` procmem
2018-06-03 16:10         ` Michael S. Tsirkin

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.