[libvirt-users] Virtio-net drivers immune to Nethammer?

procmem procmem at riseup.net
Mon May 21 23:22:29 UTC 2018



Daniel P. Berrangé:
> On Sat, May 19, 2018 at 12:42:14AM +0000, procmem wrote:
>> Hi I'm a privacy distro maintainer investigating the implications of the
>> newly published nethammer attack [0] on KVM guests particularly the
>> virtio-net drivers. The summary of the paper is that rowhammer can be
>> remotely triggered by feeding susceptible* network driver crafted
>> traffic. This attack can do all kinds of nasty things such as modifying
>> SSL certs on the victim system.
>>
>> * Susceptible drivers are those relying on Intel CAT, uncached memory or
>> the clflush instruction.
>>
>> My question is, do virtio-net drivers do any of these things?
> 
> This question is probably better directed at either linux net maintainers
> list, or the qemu developers list, since that's where the virtio-net
> experts will be.
> 
> Regards,
> Daniel
> 

OK I will thanks.




More information about the libvirt-users mailing list