Joined February 2010
Replying to @sqall01
@sqall01 @thorstenholz @grsecurity depends on the content, if javascript is involved then definitely yes.
1
Replying to @thorstenholz
@thorstenholz @grsecurity note that ASLR wasn't designed as a defense against local attacks: forums.grsecurity.net/viewto…
1
1
1
@WadeMealing @grsecurity like Exec-Shield or 4:4 were? ;)
1
@grsecurity PAX: refcount overflow occured at: prepare_creds+0x7f/0xf0
3
3
@grsecurity PAX: refcount overflow detected in: cve_2016_0728:28704, uid/euid: 0/0
9
3
@gannimo @grsecurity @stevecheckoway also so far you failed to prove that real life printf is TC. so either retract or provide proof.
Replying to @gannimo
@gannimo @grsecurity @stevecheckoway you said it was TC complete according to spec and since real life printf isn't... logic 101.
1
Replying to @gannimo
@gannimo @grsecurity @stevecheckoway RE:memcpy-like functions, they're leaves and unusable for CFB dispatching under RAP. CFB can RIP too ;)
2
1
2
Replying to @gannimo
@gannimo @grsecurity @stevecheckoway so you admit that printf itself according to real life deployments is NOT exploitable at all?
1
Replying to @copumpkin
@copumpkin @grsecurity one of them is... :)
1
RAP: RIP ROP
4
46
39