Re: [Users] rowhammer exploit

2015-03-10 Thread lst_hoe02


Zitat von Benjamin Henrion zoo...@gmail.com:


Hi,

Could this be used to gain HN root access from a container:

http://googleprojectzero.blogspot.be/2015/03/exploiting-dram-rowhammer-bug-to-gain.html?m=1

best,


As i understand this is a hardware defect, so yes it would be  
exploitable within any OS which does not explicit prevent the usage  
pattern of RAM.


Regards

Andreas



smime.p7s
Description: S/MIME Cryptographic Signature
___
Users mailing list
Users@openvz.org
https://lists.openvz.org/mailman/listinfo/users


[Users] CfP 10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC '15)

2015-03-10 Thread VHPC 15
=

CALL FOR PAPERS

10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC
'15)

held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria

(Springer LNCS)

=

Date: August 25, 2015

Workshop URL: http://vhpc.org

Paper Submission Deadline: May 22, 2015


CALL FOR PAPERS

Virtualization technologies constitute a key enabling factor for flexible
resource

management in modern data centers, cloud environments, and increasingly in

HPC as well. Providers need to dynamically manage complex infrastructures
in a

seamless fashion for varying workloads and hosted applications,
independently of

the customers deploying software or users submitting highly dynamic and

heterogeneous workloads. Thanks to virtualization, we have the ability to
manage

vast computing and networking resources dynamically and close to the
marginal

cost of providing the services, which is unprecedented in the history of
scientific

and commercial computing.

Various virtualization technologies contribute to the overall picture in
different

ways: machine virtualization, with its capability to enable consolidation
of multiple

under-utilized servers with heterogeneous software and operating systems
(OSes),

and its capability to live-migrate a fully operating virtual machine (VM)
with a very

short downtime, enables novel and dynamic ways to manage physical servers;
OS-level virtualization, with its capability to isolate multiple user-space

environments and to allow for their co-existence within the same OS kernel,

promises to provide many of the advantages of machine virtualization with
high
levels of responsiveness and performance; I/O Virtualization allows physical
network adapters to take traffic from multiple VMs; network virtualization,
with its
capability to create logical network overlays that are independent of the

underlying physical topology and IP addressing, provides the fundamental

ground on top of which evolved network services can be realized with an

unprecedented level of dynamicity and flexibility; These technologies

have to be inter-mixed and integrated in an intelligent way, to support

workloads that are increasingly demanding in terms of absolute performance,

responsiveness and interactivity, and have to respect well-specified
Service-

Level Agreements (SLAs), as needed for industrial-grade provided services.

Indeed, among emerging and increasingly interesting application domains

for virtualization, we can find big-data application workloads in cloud

infrastructures, interactive and real-time multimedia services in the cloud,

including real-time big-data streaming platforms such as used in real-time

analytics supporting nowadays a plethora of application domains. Distributed

cloud infrastructures promise to offer unprecedented responsiveness levels
for

hosted applications, but that is only possible if the underlying
virtualization

technologies can overcome most of the latency impairments typical of current

virtualized infrastructures (e.g., far worse tail-latency).

The Workshop on Virtualization in High-Performance Cloud Computing (VHPC)

aims to bring together researchers and industrial practitioners facing the
challenges

posed by virtualization in order to foster discussion, collaboration,
mutual exchange

of knowledge and experience, enabling research to ultimately provide novel

solutions for virtualized computing systems of tomorrow.

The workshop will be one day in length, composed of 20 min paper
presentations,

each followed by 10 min discussion sections, and lightning talks, limited
to 5

minutes. Presentations may be accompanied by interactive demonstrations.

TOPICS

Topics of interest include, but are not limited to:

- Virtualization in supercomputing environments, HPC clusters, cloud HPC
and grids

- Optimizations of virtual machine monitor platforms, hypervisors and
OS-level virtualization

- Hypervisor and network virtualization QoS and SLAs

- Cloud based network and system management for SDN and NFV

- Management, deployment and monitoring of virtualized environments

- Performance measurement, modelling and monitoring of virtualized/cloud
workloads

- Programming models for virtualized environments

- Cloud reliability, fault-tolerance, high-availability and security

- Heterogeneous virtualized environments, virtualized accelerators, GPUs
and co-processors

- Optimized communication libraries/protocols in the cloud and for HPC in
the cloud

- Topology management and optimization for distributed virtualized
applications

- Cluster provisioning in the cloud and cloud bursting

- Adaptation of emerging HPC technologies (high performance networks, RDMA,
etc..)

- I/O and storage virtualization, virtualization aware file systems

- Job scheduling/control/policy in virtualized environments

- Checkpointing and migration of 

[Users] rowhammer exploit

2015-03-10 Thread Benjamin Henrion
Hi,

Could this be used to gain HN root access from a container:

http://googleprojectzero.blogspot.be/2015/03/exploiting-dram-rowhammer-bug-to-gain.html?m=1

best,

-- 
Benjamin Henrion bhenrion at ffii.org
FFII Brussels - +32-484-566109 - +32-2-4148403
In July 2005, after several failed attempts to legalise software patents
in Europe, the patent establishment changed its strategy. Instead of
explicitly seeking to sanction the patentability of software, they are now
seeking to create a central European patent court, which would establish
and enforce patentability rules in their favor, without any possibility of
correction by competing courts or democratically elected legislators.
___
Users mailing list
Users@openvz.org
https://lists.openvz.org/mailman/listinfo/users


Re: [Users] rowhammer exploit

2015-03-10 Thread Solar Designer
On Tue, Mar 10, 2015 at 02:35:41PM +0100, lst_ho...@kwsoft.de wrote:
 Zitat von Benjamin Henrion zoo...@gmail.com:
 Could this be used to gain HN root access from a container:
 
 http://googleprojectzero.blogspot.be/2015/03/exploiting-dram-rowhammer-bug-to-gain.html?m=1
 
 best,
 
 As i understand this is a hardware defect, so yes it would be  
 exploitable within any OS which does not explicit prevent the usage  
 pattern of RAM.

Yes, but patching the Linux kernel to restrict access to
/proc/self/pagemap may mitigate the currently described attack.  This is
something the OpenVZ project may do.

Alexander
___
Users mailing list
Users@openvz.org
https://lists.openvz.org/mailman/listinfo/users