NVIDIA's GDDR6 Threat: Experts Pinpoint Kernel Control Vulnerability Exploitable by GDDRHammer
Advanced Rowhammer-style attacks, specifically GDDRHammer and GeForge, endanger systems using NVIDIA GPUs with GDDR6 memory, risking CPU or kernel-level compromise.
Commenters point fingers at mitigation. 'plinky' argues IOMMU must be enabled in BIOS to block GPU memory access to sensitive host areas. Another mitigation suggested is enabling GPU ECC, though 'plinky' warns this costs performance. The vulnerability scope is narrow: 'plinky' confirms the exploit targets GDDR6 specifically, noting GDDR6X and GDDR7 appear safe in testing. 'lemmydev2' names the threat, while 'digicat' frames it as a general privilege escalation attack.
Key Points
GDDR6 memory is the specific attack vector for Rowhammer exploits.
plinky explicitly stated that GDDR6X and GDDR7 were not vulnerable during testing.
IOMMU implementation is presented as the primary hardware defense.
plinky scored this high, stating IOMMU restricts device-visible virtual addresses from accessing host memory.
Enabling GPU ECC carries a known performance penalty.
plinky noted that activating ECC adds overhead and reduces usable memory.
Exploits named like GDDRHammer threaten CPU control via GPU memory.
lemmydev2 confirmed that named exploits target GPU memory to compromise the CPU.
The risk is fundamentally about privilege escalation on the GPU.
digicat contextualized the issue as a Rowhammer-based privilege escalation against GPUs.
Source Discussions (4)
This report was synthesized from the following Lemmy discussions, ranked by community score.