From owner-freebsd-security@FreeBSD.ORG Mon Mar 9 20:29:16 2015 Return-Path: Delivered-To: freebsd-security@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8188C3FF for ; Mon, 9 Mar 2015 20:29:16 +0000 (UTC) Received: from mail.bitblocks.com (ns1.bitblocks.com [173.228.5.8]) by mx1.freebsd.org (Postfix) with ESMTP id 66DE7794 for ; Mon, 9 Mar 2015 20:29:15 +0000 (UTC) Received: from bitblocks.com (localhost [127.0.0.1]) by mail.bitblocks.com (Postfix) with ESMTP id 64DFBB82A; Mon, 9 Mar 2015 13:23:08 -0700 (PDT) To: "Poul-Henning Kamp" Subject: Re: DRAM Rowhammer exploits In-reply-to: Your message of "Mon, 09 Mar 2015 19:52:04 -0000." <91440.1425930724@critter.freebsd.dk> References: <91440.1425930724@critter.freebsd.dk> Comments: In-reply-to "Poul-Henning Kamp" message dated "Mon, 09 Mar 2015 19:52:04 -0000." Date: Mon, 09 Mar 2015 13:23:08 -0700 From: Bakul Shah Message-Id: <20150309202308.64DFBB82A@mail.bitblocks.com> Cc: freebsd-security@FreeBSD.org, Dmitry Morozovsky X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Mar 2015 20:29:16 -0000 On Mon, 09 Mar 2015 19:52:04 -0000 "Poul-Henning Kamp" wrote: > -------- > In message , Dmitry Moro > zo > vsky writes: > >Dear colleagues, > > > >any thoughts we're vulnerable to this? > > It's a hardware problem, *everybody* are vulnerable. I guess manufacturer memory testing hasn't kept up to deal with shrinking geometries.... Hopefully ECC memory protects against such exploits (at least makes them a lot less vulnerable).