Thank you, Peter, for this concise description of the PAX_SIZE_OVERFLOW GCC plugin! Created in 2012, it was one of the first GCC plugins added to grsecurity. It was very advanced for its time, and in 2024, still is: lists.openwall.net/linux-har…
Thank you, Peter, for this concise description of the PAX_SIZE_OVERFLOW GCC plugin! Created in 2012, it was one of the first GCC plugins added to grsecurity. It was very advanced for its time, and in 2024, still is: lists.openwall.net/linux-har…
The purpose of the CVE system isn't a "first scrub" of potential issues based on automated commit message greps. You can't say the problem is a handful of bogus CVEs and also say the solution is to flood the system with 100x more of them and expect people to fix the created mess.
A weakness 23 years in the making: binaries and libraries built with an older toolchain act as timebombs against ASLR under "recent" Linux kernel and glibc changes.
Users: Check your exposure!
Developers: Rebuild binaries to achieve full ASLR benefit!
grsecurity.net/toolchain_nec…
A short Friday afternoon blog announcing a new version of paxtest with some useful new tests to get you ready for Monday! grsecurity.net/paxtest_relea…
Very nice! Is there a blog post explaining the principles and ideals/goals grsec takes when building mitigations? Say, how do you avoid building "just" speed bumps? @spendergrsec@_minipli
Here's a short new blog from @_minipli on the results of our exploit review applied to a recently-described in-the-wild Android kernel exploit.
It shows how we use our compiler-based defenses to land security improvements for customers quickly:
grsecurity.net/constify_fast…
Here's a short new blog from @_minipli on the results of our exploit review applied to a recently-described in-the-wild Android kernel exploit.
It shows how we use our compiler-based defenses to land security improvements for customers quickly:
grsecurity.net/constify_fast…
It's been reported this week that Linux is sunsetting its six-year XLTS experiment started in 2017. Going forward, newly chosen upstream LTS kernels will only receive two years support. See how grsecurity's three-year LTS can help affected businesses: grsecurity.net/stability_in_…
i must be missing something here ;). if some virtual call does not end up in the final asm, surely that doesn't affect whatever you computed for those that do end up in there?
you cannot be sure that code at GIMPLE stage will be places in real native code. this is general compilers problem, llvm has it too - see for example blog.trailofbits.com/2023/07…
from OBJ_TYPE_REF you can extract types of object and called method but not name of method
why does DCE matter? you can just discard the information you don't need? as for the method name, you can extract the base class info from the 'this' arg type then parsing TYPE_BINFO/BINFO_VIRTUALS/etc will get you method names.
i see, for call sites i'd look at gimple instead, IMHO it's easier to find and analyze those GIMPLE_CALLs to vmethods (OBJ_TYPE_REF models the target of the call).
KERNSEAL infrastructure, building upon a number of earlier design choices, makes it nearly trivial to achieve some impressive security goals.
With a small change to kvmclock, we now have KVM where none of the guest memory is mapped/accessible at the hypervisor level at all!
If you've been noticing your >= 5.4 LTS Linux kernel from the last month rarely/randomly hang forever at boot, it's not just you. @_minipli tracked down the culprit and provides a root cause analysis here: lore.kernel.org/lkml/5a56290…
About 20y ago, as an evolution from the userland defenses, PaX started on the kernel self-protection journey with KERNEXEC. NX kernel pages on i386 (using segmentation, no actual NX bit then), some read-only kernel data, etc. Still riding high :).