L1TF 重载版
L1TF Reloaded

原始链接: https://github.com/ThijsRay/l1tf_reloaded

Rain研究项目展示了一种新的漏洞,名为“L1TF Reloaded”,能够从AWS和Google Cloud等云环境中泄露敏感数据。它利用了L1TF和(半)Spectre瞬态执行漏洞的结合,绕过了常见的软件缓解措施,如L1d刷新和核心调度。 该漏洞通过恶意虚拟机(VM)识别并定位同一物理主机上的另一个VM来实现,在演示中,它成功地从Nginx Web服务器中提取了私有TLS密钥。虽然KVM中使用的特定小工具已被修补,但旧内核版本仍然存在漏洞。 即使在更新的系统上,根本问题仍然存在,需要不同的利用技术。研究人员建议实施更广泛的“一揽子”缓解措施,以应对L1TF Reloaded和其他微架构攻击,从而增强云安全。该项目提供了漏洞利用代码和详细的复现说明。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 L1TF 重载 (github.com/thijsray) 5 分,来自 Fnoord 58 分钟前 | 隐藏 | 过去 | 收藏 | 讨论 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

The Rain research project shows how a malicious virtual machine can abuse transient execution vulnerabilities to leak data from the host, as well as from other virtual machines. This repository contains the research artifact: the L1TF Reloaded exploit and instructions on how to reproduce our results.

For details, we refer you to:

Our end-to-end exploit, called "L1TF Reloaded", abuses two long-known transient execution vulnerabilities: L1TF and (Half-)Spectre. By combining them, commonly deployed software-based mitigations against L1TF, such as L1d flushing and core scheduling, can be circumvented.

We have launched our exploit against the production clouds of both AWS and Google. Below is a (fast-forwarded) recording of our exploit running within a VM on GCE. The exploit, at runtime, finds another VM on the same physical host, detects that it is running an Nginx webserver, and leaks its private TLS key.

L1TF Reloaded demonstration on GCE

This repository is structured as follows:

  • deps: exploit dependencies
  • include: exploit headers files
  • scripts: utility scripts
  • setup: reproduction resources
  • src: exploit source code

We provide detailed reproduction instructions for:

The specific gadgets that we leverage have been patched in KVM. On Intel CPUs that are affected by L1TF, only stable kernel releases before 5.4.298, 5.10.242, 5.15.191, 6.1.150, 6.6.104, 6.12.45 or 6.16.5 are vulnerable to this specific attack. The underlying issue is still there, but a different half-Spectre gadget is necessary to exploit L1TF Reloaded on up-to-date production systems. As discussed in our paper, we recommend deploying additional blanket mitigations against L1TF Reloaded's attack strategy, as well as other microarchitectural attacks in general.

联系我们 contact @ memedata.com