Stefan Hajnoczi:
> On Mon, May 21, 2018 at 11:24:43PM +0000, procmem wrote:
>> Hi I'm a privacy distro maintainer investigating the implications of the
>> newly published nethammer attack [0] on KVM guests particularly the
>> virtio-net drivers. The summary of the paper is that rowhammer can be
>> remotely triggered by feeding susceptible* network driver crafted
>> traffic. This attack can do all kinds of nasty things such as modifying
>> SSL certs on the victim system.
>>
>> * Susceptible drivers are those relying on Intel CAT, uncached memory or
>> the clflush instruction.
>>
>> My question is, do virtio-net drivers do any of these things?
> I have CCed Michael Tsirkin and Jason Wang, the virtio maintainers.
> 
>> ***
>>
>> [0] https://arxiv.org/abs/1805.04956
>>
>>
>>

Thanks :) I thought my message was forgotten

Reply via email to