Remix.run Logo
New Rowhammer attacks give complete control of machines running Nvidia GPUs(arstechnica.com)
46 points by 01-_- 3 hours ago | 4 comments
stratos123 an hour ago | parent [-]

Notable parts:

- "GPU users should understand that the only cards known to be vulnerable to Rowhammer are the RTX 3060 and RTX 6000 from the Ampere generation"

- mitigations are enabling ECC on the GPU or enabling IOMMU in BIOS

So doesn't sound like a big deal for users, this is more of a datacenter sort of vulnerability. The fact that this attack is possible at all (you can turn small GPU memory writes into access to CPU memory) is pretty shocking to me, though.

SkiFire13 2 minutes ago | parent | next [-]

> So doesn't sound like a big deal for users, this is more of a datacenter sort of vulnerability.

If I understand it correctly though this can be used for priviledge escalation though, since it allows access to arbitrary memory.

adrian_b an hour ago | parent | prev | next [-]

Those are the cards that have been tested.

It is very likely that the attacks work on most or all consumer Ampere cards, depending on what kinds of GDDR memories they are using. They might also work on more recent GPUs.

However, it is true that such attacks are normally useful only on multi-user machines.

The most important thing is that the attacks are prevented by enabling the IOMMU in the BIOS. This is a setting that should always be enabled, because it prevents not only malicious attacks, but also memory corruption due to bugs.

Unfortunately, many BIOSes have the IOMMU disabled by default, for fear of creating problems for some legacy operating systems or applications.

pclmulqdq 22 minutes ago | parent | prev [-]

Datacenters tend to have IOMMU turned on. Consumer devices are the ones that don't turn this on by default.