[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] Virtio-net drivers immune to Nethammer?
From: |
procmem |
Subject: |
[Qemu-devel] Virtio-net drivers immune to Nethammer? |
Date: |
Mon, 21 May 2018 23:24:43 +0000 |
Hi I'm a privacy distro maintainer investigating the implications of the
newly published nethammer attack [0] on KVM guests particularly the
virtio-net drivers. The summary of the paper is that rowhammer can be
remotely triggered by feeding susceptible* network driver crafted
traffic. This attack can do all kinds of nasty things such as modifying
SSL certs on the victim system.
* Susceptible drivers are those relying on Intel CAT, uncached memory or
the clflush instruction.
My question is, do virtio-net drivers do any of these things?
***
[0] https://arxiv.org/abs/1805.04956
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Qemu-devel] Virtio-net drivers immune to Nethammer?,
procmem <=