ALL open source software is vulnerable to Rowhammer

Servers running on proprietary software not affected. Windows wins again.

A Conspiracy Theorist Is Talking Shirt $21.68

Black Rifle Cuck Company, Conservative Humor Shirt $21.68

A Conspiracy Theorist Is Talking Shirt $21.68

  1. 1 month ago
    Anonymous

    Does that mean anyone can l33t h4x my public servers?

  2. 1 month ago
    Anonymous

    >software mitigation that effectively reduces performance
    just get ECC memory you moron

  3. 1 month ago
    Anonymous

    This is false. Row hammer was partially mitigated, but not completely. That's true across all machines (well, all modern ones) and is not an open source vs proprietary issue.

    • 1 month ago
      Anonymous

      This is a hardware exploit, all software is vulnerable to it.

      Actual midwits spouting the approved reddit consensus with zero critical thinking.
      You CAN'T know how to exploit rowhammer on a closed source system. An open source system gives you the exact memory layout of the secrets and flags.

      • 1 month ago
        Anonymous

        That's not how PIC or KLSR wokr

        • 1 month ago
          Anonymous

          You don't know how rowhammer (very simple concept) works.

          • 1 month ago
            Anonymous

            There is no consistent way to get access to physical memory physically located near other physical memory on any modern system. Period.

      • 1 month ago
        Anonymous

        I'm running Alpine Linux and have NSD exposed. When will someone rowhammer me? Sounds so dirty.

      • 1 month ago
        Anonymous

        If you are going to develop a row hammer attack on some software, you are going to be analyzing compiled binaries that you have reverse engineered, regardless of whether they are open source or closed source. Source code won't tell you the exact locations of a lot of data in memory, since the compiler is free to optimize this.

        • 1 month ago
          Anonymous

          >another midwit
          I'm not even going to bother with this one. I'll let you find all the 3 errors yourself.

          • 1 month ago
            Anonymous

            You are making no arguments in this thread other than the baseless claim that understanding memory layout is only possible in an open source system. Protip: there are numerous other memory-related vulnerabilities that are regularly discovered in proprietary software using techniques that do not involve analyzing the source code. Compiled binaries aren't a black box. They're more difficult to analyze than source code, but not impossible. And security researchers have the time and money to analyze compiled binaries.

          • 1 month ago
            Anonymous

            What binaries you moron? It's on a server.

          • 1 month ago
            Anonymous

            If the server is running commercial software, it can still be analyzed. Additionally, I would note that there are limitations to performing rowhammer remotely. If you are capable of obtaining execution permissions to execute rowhammer locally on the server, you are also capable of exfiltrating the binary for analysis.

  4. 1 month ago
    Anonymous

    This doesn't happen with DDR5 and never happened if you actually ran your memory inside its Intel spec (which nobody ever did because gaymer motherboard had a button to make it go faster).

    • 1 month ago
      Anonymous

      >This doesn't happen with DDR5
      wrong
      >never happened if you actually ran your memory inside its Intel spec (which nobody ever did because gaymer motherboard had a button to make it go faster).
      >making stuff up

      • 1 month ago
        Anonymous

        Yeah I definitely trust you a random freetard on the internet over the NSA.

        • 1 month ago
          Anonymous

          >over the NSA
          what

          • 1 month ago
            Anonymous

            The National Security Administration. The only good source of security information not because they are a government agency but because they employ every competent hacker that isn't in jail and half that are.

          • 1 month ago
            Anonymous

            And what do they have to say on this issue, pray tell? Because I doubt it is anything remotely similar to the nonsense in OP.

          • 1 month ago
            Anonymous

            No you moron, I meant that NSA didn't ever claim that DDR5 RAM is unaffected by rowhammer

          • 1 month ago
            Anonymous

            yeah they did

          • 1 month ago
            Anonymous

            Did you forget to take your meds? It didn't happen

      • 1 month ago
        Anonymous

        The National Security Administration. The only good source of security information not because they are a government agency but because they employ every competent hacker that isn't in jail and half that are.

        also the make-believe Intel RAM specs and mobo speed up button

        • 1 month ago
          Anonymous

          Intel validates their platforms to support a certain RAM speed specifically to go as fast as possible without bit flips. Hardware OEMs and BIOS vendors market and use a number 40-100% higher than that. This isn't new.

          • 1 month ago
            Anonymous

            But it's not users' fault nor can they do anything about it

            qrd?

            Here:
            https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity
            but it effectively slows down memory access

          • 1 month ago
            Anonymous

            >it's not users' fault nor can they do anything about it
            All they have to do is not enable XMP/DOCP. In all but the worst chinkshit it's off by default because they don't want to get sued by businesses. But every Y*uT*ber has spent a decade telling everyone to turn it on so "good with computers" midwits are enabling global Chinese botnets.

          • 1 month ago
            Anonymous

            Seriously, exactly how many people do you think ever access BIOS settings?

          • 1 month ago
            Anonymous

            Everyone with a "smart grandson" that watches linus tech tips

  5. 1 month ago
    Anonymous

    I don't care about these exploits.

  6. 1 month ago
    Anonymous

    Maybe all this rowhammer stuff is just made up. Nobody has ever rowhammered my servers and obtained any of my deep dark secrets.

  7. 1 month ago
    Anonymous

    qrd?

  8. 1 month ago
    Anonymous

    Works on my c2d ddr2 machine.

  9. 1 month ago
    Anonymous

    This is a hardware exploit, all software is vulnerable to it.

  10. 1 month ago
    Anonymous

    >Vulnerability L1tf: Mitigation; PTE Inversion
    >Vulnerability Mds: Vulnerable; SMT Host state unknown
    >Vulnerability Meltdown: Vulnerable
    >Vulnerability Mmio stale data: Vulnerable
    >Vulnerability Retbleed: Vulnerable
    >Vulnerability Spec store bypass: >Vulnerable
    Vulnerability Spectre v1: Vulnerable

    How long until someone pops my DNS server?

  11. 1 month ago
    Anonymous

    Imagine if they were grouped like the first spot lmao

  12. 1 month ago
    Anonymous

    Row hammer is a hardware vulnerability. Proprietary software is no more secure against it than any other software.

    • 1 month ago
      Anonymous
  13. 1 month ago
    Anonymous

    >buzzword spam
    This is how you know it's a pajeet.

Leave a Reply to Anonymous Cancel reply

Your email address will not be published. Required fields are marked *