Practical Timing Side Channel Attacks on Memory Compression - Mailing list pgsql-hackers

From Filip Janus
Subject Practical Timing Side Channel Attacks on Memory Compression
Date
Msg-id CAFjYY+KZmYWM26YeJGy2Wxm-=MiMaaoQ02hejyN1W7C9brLD0g@mail.gmail.com
Whole thread Raw
Responses Re: Practical Timing Side Channel Attacks on Memory Compression  (Robert Haas <robertmhaas@gmail.com>)
List pgsql-hackers
Hi all,
A few months ago a group of researchers published a paper about LZ77 vulnerability[1]. And it also affects PGLZ. From my point of view, it could be a really dangerous issue for some kind of application. If I understand it correctly there is a possibility of leaking approx. 24B secret data per hour(but it depends on HW configuration).

I understand that there is no simple and easy solution.  But I would like to know Your opinion on this. Or if you have any plan on how to deal with this?

Thanks

pgsql-hackers by date:

Previous
From: Michael Paquier
Date:
Subject: Re: [PATCH] Expose port->authn_id to extensions and triggers
Next
From: Alvaro Herrera
Date:
Subject: Re: shared-memory based stats collector - v70