ALL open source software is vulnerable to Rowhammer

Servers running on proprietary software not affected. Windows wins again.

It's All Fucked Shirt $22.14

Homeless People Are Sexy Shirt $21.68

It's All Fucked Shirt $22.14

  1. 2 weeks ago
    Anonymous

    Does that mean anyone can l33t h4x my public servers?

  2. 2 weeks ago
    Anonymous

    >software mitigation that effectively reduces performance
    just get ECC memory you moron

  3. 2 weeks ago
    Anonymous

    This is false. Row hammer was partially mitigated, but not completely. That's true across all machines (well, all modern ones) and is not an open source vs proprietary issue.

    • 2 weeks ago
      Anonymous

      This is a hardware exploit, all software is vulnerable to it.

      Actual midwits spouting the approved reddit consensus with zero critical thinking.
      You CAN'T know how to exploit rowhammer on a closed source system. An open source system gives you the exact memory layout of the secrets and flags.

      • 2 weeks ago
        Anonymous

        That's not how PIC or KLSR wokr

        • 2 weeks ago
          Anonymous

          You don't know how rowhammer (very simple concept) works.

          • 2 weeks ago
            Anonymous

            There is no consistent way to get access to physical memory physically located near other physical memory on any modern system. Period.

      • 2 weeks ago
        Anonymous

        I'm running Alpine Linux and have NSD exposed. When will someone rowhammer me? Sounds so dirty.

      • 2 weeks ago
        Anonymous

        If you are going to develop a row hammer attack on some software, you are going to be analyzing compiled binaries that you have reverse engineered, regardless of whether they are open source or closed source. Source code won't tell you the exact locations of a lot of data in memory, since the compiler is free to optimize this.

        • 2 weeks ago
          Anonymous

          >another midwit
          I'm not even going to bother with this one. I'll let you find all the 3 errors yourself.

          • 2 weeks ago
            Anonymous

            You are making no arguments in this thread other than the baseless claim that understanding memory layout is only possible in an open source system. Protip: there are numerous other memory-related vulnerabilities that are regularly discovered in proprietary software using techniques that do not involve analyzing the source code. Compiled binaries aren't a black box. They're more difficult to analyze than source code, but not impossible. And security researchers have the time and money to analyze compiled binaries.

          • 2 weeks ago
            Anonymous

            What binaries you moron? It's on a server.

          • 2 weeks ago
            Anonymous

            If the server is running commercial software, it can still be analyzed. Additionally, I would note that there are limitations to performing rowhammer remotely. If you are capable of obtaining execution permissions to execute rowhammer locally on the server, you are also capable of exfiltrating the binary for analysis.

  4. 2 weeks ago
    Anonymous

    This doesn't happen with DDR5 and never happened if you actually ran your memory inside its Intel spec (which nobody ever did because gaymer motherboard had a button to make it go faster).

    • 2 weeks ago
      Anonymous

      >This doesn't happen with DDR5
      wrong
      >never happened if you actually ran your memory inside its Intel spec (which nobody ever did because gaymer motherboard had a button to make it go faster).
      >making stuff up

      • 2 weeks ago
        Anonymous

        Yeah I definitely trust you a random freetard on the internet over the NSA.

        • 2 weeks ago
          Anonymous

          >over the NSA
          what

          • 2 weeks ago
            Anonymous

            The National Security Administration. The only good source of security information not because they are a government agency but because they employ every competent hacker that isn't in jail and half that are.

          • 2 weeks ago
            Anonymous

            And what do they have to say on this issue, pray tell? Because I doubt it is anything remotely similar to the nonsense in OP.

          • 2 weeks ago
            Anonymous

            No you moron, I meant that NSA didn't ever claim that DDR5 RAM is unaffected by rowhammer

          • 2 weeks ago
            Anonymous

            yeah they did

          • 2 weeks ago
            Anonymous

            Did you forget to take your meds? It didn't happen

      • 2 weeks ago
        Anonymous

        The National Security Administration. The only good source of security information not because they are a government agency but because they employ every competent hacker that isn't in jail and half that are.

        also the make-believe Intel RAM specs and mobo speed up button

        • 2 weeks ago
          Anonymous

          Intel validates their platforms to support a certain RAM speed specifically to go as fast as possible without bit flips. Hardware OEMs and BIOS vendors market and use a number 40-100% higher than that. This isn't new.

          • 2 weeks ago
            Anonymous

            But it's not users' fault nor can they do anything about it

            qrd?

            Here:
            https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity
            but it effectively slows down memory access

          • 2 weeks ago
            Anonymous

            >it's not users' fault nor can they do anything about it
            All they have to do is not enable XMP/DOCP. In all but the worst chinkshit it's off by default because they don't want to get sued by businesses. But every Y*uT*ber has spent a decade telling everyone to turn it on so "good with computers" midwits are enabling global Chinese botnets.

          • 2 weeks ago
            Anonymous

            Seriously, exactly how many people do you think ever access BIOS settings?

          • 2 weeks ago
            Anonymous

            Everyone with a "smart grandson" that watches linus tech tips

  5. 2 weeks ago
    Anonymous

    I don't care about these exploits.

  6. 2 weeks ago
    Anonymous

    Maybe all this rowhammer stuff is just made up. Nobody has ever rowhammered my servers and obtained any of my deep dark secrets.

  7. 2 weeks ago
    Anonymous

    qrd?

  8. 2 weeks ago
    Anonymous

    Works on my c2d ddr2 machine.

  9. 2 weeks ago
    Anonymous

    This is a hardware exploit, all software is vulnerable to it.

  10. 2 weeks ago
    Anonymous

    >Vulnerability L1tf: Mitigation; PTE Inversion
    >Vulnerability Mds: Vulnerable; SMT Host state unknown
    >Vulnerability Meltdown: Vulnerable
    >Vulnerability Mmio stale data: Vulnerable
    >Vulnerability Retbleed: Vulnerable
    >Vulnerability Spec store bypass: >Vulnerable
    Vulnerability Spectre v1: Vulnerable

    How long until someone pops my DNS server?

  11. 2 weeks ago
    Anonymous

    Imagine if they were grouped like the first spot lmao

  12. 2 weeks ago
    Anonymous

    Row hammer is a hardware vulnerability. Proprietary software is no more secure against it than any other software.

    • 2 weeks ago
      Anonymous
  13. 2 weeks ago
    Anonymous

    >buzzword spam
    This is how you know it's a pajeet.

Your email address will not be published. Required fields are marked *