Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2019-04-26 15:26:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] Bounce buffers for untrusted devices
The recently discovered vulnerability in
Thunderbolt
has restarted discussions about protecting the kernel
against untrusted, hotpluggable hardware. That vulnerability, known as Thunderclap, allows a hostile external
device to exploit Input-Output
Memory Management Unit (IOMMU)
mapping limitations and access system
memory it was not intended to. Thunderclap can be exploited by
USB-C-connected devices; while we have seen USB attacks in the past, this
vulnerability is different in that PCI devices, often considered as
trusted, can be a source of attacks too. One way of stopping those attacks
would be to make sure that the IOMMU is used correctly and restricts the device
to accessing the memory that was allocated for it. Lu Baolu has posted
an implementation of that approach
in the form of bounce buffers for
untrusted devices.


(Читать комментарии) (Добавить комментарий)