Aerosol Posted March 10, 2015 Report Posted March 10, 2015 Sources:http://googleprojectzero.blogspot.ca/2015/03/exploiting-dram-rowhammer-bug-to-gain.htmlhttps://code.google.com/p/google-security-research/issues/detail?id=283Full PoC: http://www.exploit-db.com/sploits/36310.tar.gzThis is a proof-of-concept exploit that is able to gain kernelprivileges on machines that are susceptible to the DRAM "rowhammer"problem. It runs as an unprivileged userland process on x86-64 Linux.It works by inducing bit flips in page table entries (PTEs).For development purposes, the exploit program has a test mode in whichit induces a bit flip by writing to /dev/mem. qemu_runner.py will runthe exploit program in test mode in a QEMU VM. It assumes that"bzImage" (in the current directory) is a Linux kernel image that wasbuilt with /dev/mem enabled (specifically, with the theCONFIG_STRICT_DEVMEM option disabled).Mark Seabornmseaborn@chromium.orgMarch 2015Source Quote