Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add mitigating measures against rowhammer attacks. #763

Closed
squell opened this issue Sep 15, 2023 · 0 comments · Fixed by #765
Closed

Add mitigating measures against rowhammer attacks. #763

squell opened this issue Sep 15, 2023 · 0 comments · Fixed by #765

Comments

@squell
Copy link
Collaborator

squell commented Sep 15, 2023

This pre-print describes some use of rowhammer attacks against sudo: https://arxiv.org/pdf/2309.02545.pdf. The mitigations listed in the section feel a bit "only half a solution", since opcode flipping is still a risk; and opinions among security researchers I consulted is that there is only so much you can do in software to protect against this.

Still, some low-hanging fruit which is easily done in Rust is to use arbitrary enum discriminants; e.g. we could not just protect the "is this user authentication bit", but the entire AST of the sudoers parser.

original sudo has recently added similar mitigations, see: sudo-project/sudo@7873f83#diff-b8ac7ab4c3c4a75aed0bb5f7c5fd38b9ea6c81b7557f775e46c6f8aa115e02cd

(hat-tip to Todd Miller for sharing)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant