Looking at a private version of PaX/grsec from the 2nd half of this year, there's no probabilistic xor cookie retaddr protection for the 'iret' insn case. I'm not saying it can't be done & I'm also not saying it isn't implemented in some later or exotic commercial version.
Talking about bruised egos, apparently a certain someone decided to throw a tantrum and block me because he just got nominated for the Lamest Vendor Response award... Isn't it ironic? Good riddance!
Fun fact: the initial Kaiser (currently KPTI) patches, which were meant to fix KASLR breaks via CPU side-channel attacks (read: not Meltdown), specifically said that KASLR could still be broken. For more, see "challenge 2" from the original paper.
@bluefrostsec@NicoEconomou I liked the blog but this tweet is pretty dramatic. kASLR was vulnerable to timing attacks prior to Meltdown and we explicitly documented that our Meltdown mitigation does not attempt to solve kASLR. kASLR was never safe from timing attacks nor should anyone have expected it was.
Cool writeup exploiting FreeBSD bhyve. Nice to see the same points from other platforms repeat here:
- CFI makes more exploits leak the stack && do ROP (it's easy)
- RFG/SafeStack/whatever in software is weak, many ways to leak the shadow stack address
phrack.org/papers/escapin…
Interesting facts about 'exec_id' - almost all Linux kernels insufficiently restrict exit signals (except 2.0.39 and 2.0.40 ;-))
blog.pi3.com.pl/?p=697
44K Followers 3K FollowingChoose disfavour where obedience does not bring honour.
I do math. And was once asked by R. Morris Sr. : "For whom?"
@[email protected]
7K Followers 788 FollowingSecurity engineer at https://t.co/027VXUlgOx. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at https://t.co/D5MrxmYimS.
52 Followers 473 FollowingShe / Her. Making cybersecurity accessible to everyone and helping you stay safe against cybercrime. X is a platform run by a fascist
44K Followers 3K FollowingChoose disfavour where obedience does not bring honour.
I do math. And was once asked by R. Morris Sr. : "For whom?"
@[email protected]
7K Followers 788 FollowingSecurity engineer at https://t.co/027VXUlgOx. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at https://t.co/D5MrxmYimS.
3K Followers 544 FollowingDon't for get the Jacobian. Opinions are mine. Interested in improving IT-Security. Intel employee. This is a personal account, opinions are mine.
5K Followers 1K FollowingCTO @crashappsec. Past: Cofounder and Chief Scientist @capsule8, Hacker-in-Residence @NYUTandon, and other research, reverse-engineering, and exploit dev roles.
7K Followers 1K FollowingDocumentation is lies. Source is an abstraction. Assembly is the truth. Also at https://t.co/VYFZ0HHnQn and nostr npub10mx0gx3r2lszrrut8kvr5mt2m8r9ffhn
155 Followers 131 FollowingInvited Assistant Lecturer. InfoSec enthusiast. I love to break stuff. Understanding how things work is half the way for pwnage. Opinions are my own.
2K Followers 241 FollowingBJJ Black Belt. Type Confused. calc||GTFO. Retired @OpenBSD committer, former @ProjectHoneynet researcher, @exploitdb core team vet.
636 Followers 676 FollowingOrganic hacker, sharing Bio && Healthy hacks. Supporter of the charity cause, 'helping noobs to exit vim' - because everyone deserves a chance to write and quit
12K Followers 24 FollowingAn annual awards ceremony celebrating and making fun of the achievements and failures of security researchers and the wider security community.
12K Followers 649 FollowingKilling bug classes and breaking exploits as part of @msftsecresponse. Adding more entropy to the Internet. https://t.co/J8GCGurGP3