On Mon, May 21, 2018 at 11:24:43PM +0000, procmem wrote: > Hi I'm a privacy distro maintainer investigating the implications of the > newly published nethammer attack [0] on KVM guests particularly the > virtio-net drivers. The summary of the paper is that rowhammer can be > remotely triggered by feeding susceptible* network driver crafted > traffic. This attack can do all kinds of nasty things such as modifying > SSL certs on the victim system. > > * Susceptible drivers are those relying on Intel CAT, uncached memory or > the clflush instruction. > > My question is, do virtio-net drivers do any of these things?
I have CCed Michael Tsirkin and Jason Wang, the virtio maintainers. > *** > > [0] https://arxiv.org/abs/1805.04956 > > >
signature.asc
Description: PGP signature