The accepted answer, unfortunately, has outdated information. TLDR: SECDED ECC will not save you and neither will pTRR or TRR. And no, faster refresh rate will not help either. :)
SECDED ECC (Single Error Correction and Double Error Detection Error Correcting Codes)
The accepted answer says:
ECC effectively turns the Row Hammer exploit into a DOS attack. 1bit
errors will be corrected by ECC, and as soon as a non-correctable 2bit
error is detected the system will halt (assuming SECDED ECC).
This inforamtion is outdated. More recent research has repeatedly demonstrated that Rowhammer attacks on ECC memory are possible. Most notably in 2019 VUSec published ECCPloit "the new attack to reliably flip bits that completely bypass ECC protection" (emphasis mine).
TRR and pTRR (Target Row Refresh and Pseudo Target Row Refresh)
The accepted answer says:
A solution is to buy hardware that supports pTRR or TRR
This recommendation is unfortunately outdated too.
Notable papers:
In theory just because past implementations of TRR were proven vulnerable does not rule out the possibility that a secure implementation could exist in the future. I would, hovever, advice that any new implementation of TRR should be treated with scepticism - we can only trust it if it was proven secure not just against previously-published hammering patters, but for the general case of an arbitrary attacker-controlled hammering pattern.
Faster refresh rates
The accepted answer says:
Faster refresh rates (32ms instead of 64ms) ... help, too
No they don't. The TRRespass paper demonstrated bit flips even when both TRR and double refresh are used at the same time.
To answer the original question
Assuming the sources I have linked above can be trusted and are not mad ravings of paranoid tinfoil-wearers here is my interpretation of the current state of the art:
- What is the probability of the bug triggering at random in a server-grade DRAM chip with ECC?
- I don't know - most sources I found focus on intentional exploitation rather than accidental bit flips.
- How do I know whether the bug is fixed before buying memory?
- Easy: the bug has probably not been fixed and even if running prevously published proofs of concept on your system produces no bit flips someone will probably eventually reverse-engineer the magic sauce and find a hammering pattern that bypasses it. :)
- What should I do to counter malicious attempts to do privilege escalation by e.g. tenants or unprivileged users on e.g. CentOS 7?
- You can't (until new mitigations are implemented and are proven to be secure)