grsecurity

@grsecurity

Official grsecurity news feed

Geregistreerd in oktober 2012

Tweets en antwoorden

@grsecurity is geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @grsecurity wordt niet gedeblokkeerd door Tweets te bekijken.

  1. randomization is not the way today. Stop the attack at the origin (prevent the first non authorized return)

  2. BTW, you can't just blindly reorder the Linux kernel, some objects depend on specific order (e.g. initcalls)

  3. extrapolating some bogus theory out of a single data point = captain hindsight FUD

  4. Als antwoord op

    and importantly *NOT* mentioning that the change was to code with an existing int truncation flaw that would cause the same DoS

  5. Als antwoord op

    saying we don't have code review, that it's exploitable, that patches you don't have access to were affected

  6. Als antwoord op

    Happy to take real criticism and bug reports, but what you've been sending out to your followers is simply FUD

  7. still not a ROP defense and I would never advertise it as one

  8. Als antwoord op

    I was doing this with the kernel years ago: -rw-r--r-- 1 spender spender 1172 Aug 13 2011 rand_ld.c

  9. Als antwoord op

    the bug is 'really sad' yet your own analysis was wrong, I don't see you repeating that to your 21k clueless followers

  10. you're acting like a child who found his first bug and in being oh-so-proud of it is blowing it completely out of proportion

  11. Als antwoord op

    Stop spreading FUD, I had changes queued up for both of them (two of the other patches I also applied to -test)

  12. New test patch up with improved protection against irrelevant infosec anklebiters

  13. also you failed to mention in your diatribe that the upstream code had an int truncation that also triggered SIZE_OVERFLOW

  14. The proper fix (aka not yours, Mr. High Horse Captain Obvious) will be in the next patch, but good luck obtaining it

  15. Als antwoord op

    Done with your diatribe? Good, now read this: aka "try reading the code next time"

  16. Als antwoord op

    yes, no changes there. 4.5 should be out soon

  17. Grsecurity is choosing 4.4 as its next stable kernel tree and will continue to support 3.14 through the end of 2017

  18. because people for whom bugfixing = security learn nothing by fixing yet another bug

  19. just for the curiosity of seeing how long they last and make the point that bugfixing != security

  20. Als antwoord op

    not true; I sit on a bunch, never use them, and care very much

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of het ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·