1 comments

  • stratos1231 hour ago
    Notable parts:<p>- &quot;GPU users should understand that the only cards known to be vulnerable to Rowhammer are the RTX 3060 and RTX 6000 from the Ampere generation&quot;<p>- mitigations are enabling ECC on the GPU or enabling IOMMU in BIOS<p>So doesn&#x27;t sound like a big deal for users, this is more of a datacenter sort of vulnerability. The fact that this attack is possible at all (you can turn small GPU memory writes into access to <i>CPU</i> memory) is pretty shocking to me, though.
    • adrian_b52 minutes ago
      Those are the cards that have been tested.<p>It is very likely that the attacks work on most or all consumer Ampere cards, depending on what kinds of GDDR memories they are using. They might also work on more recent GPUs.<p>However, it is true that such attacks are normally useful only on multi-user machines.<p>The most important thing is that the attacks are prevented by enabling the IOMMU in the BIOS. This is a setting that should always be enabled, because it prevents not only malicious attacks, but also memory corruption due to bugs.<p>Unfortunately, many BIOSes have the IOMMU disabled by default, for fear of creating problems for some legacy operating systems or applications.
    • pclmulqdq5 minutes ago
      Datacenters tend to have IOMMU turned on. Consumer devices are the ones that don&#x27;t turn this on by default.