
oss-sec mailing list archives
Re: Meltdown-US / Meltdown 3a Remaining Leakage
From: Solar Designer <solar () openwall com>
Date: Sat, 7 Oct 2023 00:18:24 +0200
Hello Daniel et al., Thank you very much for your research and for posting about it in here! On Fri, Oct 06, 2023 at 12:07:17PM +0200, Daniel Weber wrote:
we analyzed the remaining leakage of the "original" Meltdown attack (Meltdown-US) (1) and the variant Meltdown 3a (2). We discovered that the "original" Meltdown attack can be abused to infer the cache state of memory pages that remain mapped despite KPTI. This allows an attacker to monitor interrupt activity.
I assume you're talking specifically about Linux's KPTI. Let's be naming Linux explicitly, as this list isn't only about Linux. In Linux, /proc/interrupts is generally world-readable. So perhaps that's something to fix first, since yes it's known to allow for keystroke timing attacks. Should be fixed in the kernel or/and chmod'ed by the userland. And then:
1) Preventing the Meltdown attack from leaking information about the cache state can be achieved by marking the remaining memory pages, e.g., the IDT, as uncacheable. This can be achieved by using a memory-type range register (MTRR) or by modifying the corresponding page-table entries.
Alexander
Current thread:
- Meltdown-US / Meltdown 3a Remaining Leakage Daniel Weber (Oct 06)
- Re: Meltdown-US / Meltdown 3a Remaining Leakage Solar Designer (Oct 06)
- Re: Meltdown-US / Meltdown 3a Remaining Leakage Michael Schwarz (Oct 08)
- Re: Meltdown-US / Meltdown 3a Remaining Leakage Solar Designer (Oct 06)