KSPP fairy tale du jour: openwall.com/lists/kernel-ha… … (hint: if RANDKSTACK was inspired by stackjacking then how could the supposed inspiring presentation have talked about it? perhaps because in reality it had already existed for almost a decade? :))
Please join the Windows kernel in wishing farewell to uninitialized plain-old-data structs on the stack. As of today's WIPFast build, any Windows code compiled with /kernel also gets compiled with InitAll, a compiler security feature that initializes POD structs at declaration.
Reminded during the 4.19 port the repeating theme of kernel devs still not understanding what they upstream from us: compare git.kernel.org/pub/scm/linux… to git.kernel.org/pub/scm/linux… . it cost the totally unnecessary realignment of a hundred lines of code in a core VM structure /o\.
After yesterday's discussion about the use of Turing-Complete in exploitation papers, and realizing how commonly the other important term close to my heart, "weird machine", is misunderstood, I wrote a (rather unpolished) blog post about it. addxorrol.blogspot.com/2018/…
opal_error_to_human shows how subtle and deep Spectre v1 can go. this one is probably not useful but it shows the evolving power of our Spectre v1 static analysis tool. only 2600+ instances to go through ;).
is it just me or did SPECTRE manifest @halvarflake's "weird machine" concept in real hardware? i hope someone's already working on a paper about the computational power of this machine.
Pour one out for this really nice Linux kernel bugdoor that P0 killed a few hours ago. Straight up unlimited R/W to all kernel memory via ebpf verifier bypass. One of the best/worst Linux kernel vulns of all time