Brad Spengler

7.1K posts

Brad Spengler

Brad Spengler

@spendergrsec

President of @opensrcsec, developer of @grsecurity Personal account

Katılım Haziran 2011
4 Takip Edilen4.4K Takipçiler
Brad Spengler retweetledi
grsecurity
grsecurity@grsecurity·
Today, @_minipli has submitted patches for the NVIDIA open gpu kernel modules that implement full Kbuild support, paving the way for CFI, KASAN/UBSAN, and our many compiler plugins. Running AI workloads with NVIDIA GPUs no longer means weakening kernel security. Links below 👇
English
1
6
21
1.3K
Brad Spengler
Brad Spengler@spendergrsec·
Manual backports posted for all 7 now, can be viewed in the lore link
English
1
0
1
147
Brad Spengler
Brad Spengler@spendergrsec·
Two now finally (why two?): @gregkh/T/#u" target="_blank" rel="nofollow noopener">lore.kernel.org/linux-cve-anno… @gregkh/T/#u" target="_blank" rel="nofollow noopener">lore.kernel.org/linux-cve-anno…
English
0
0
1
201
Brad Spengler
Brad Spengler@spendergrsec·
Not sure what's going on with the assignment lately, whole thing seems to be running like a service for gatekeeping/control and not anything designed to benefit others. Vulnerabilities recognized (or not) on their schedule, no CVEs still for the AppArmor vulns, etc.
English
2
0
5
424
Brad Spengler retweetledi
h0mbre
h0mbre@h0mbre_·
kCTF is removing unpriv user namespaces completely by virtue of removing their COS instances from the program. they are also removing the mitigation instance. LTS instance only starting in late April. going to need some good bugs to play.
English
1
5
50
3.6K
Brad Spengler
Brad Spengler@spendergrsec·
None of this would have been acceptable years ago when it was RH or anyone else assigning the CVEs, not sure why people are pretending it's acceptable now 🤷‍♂️
English
0
0
1
150
Brad Spengler retweetledi
Qualys
Qualys@qualys·
The Qualys Threat Research Unit (TRU) has identified a Local Privilege Escalation (LPE) vulnerability, CVE-2026-3888, affecting default installations of Ubuntu Desktop v.24.04 and later. This flaw allows a local attacker to escalate privileges to full root access through the interaction of two standard system components. Read the blog for details: blog.qualys.com/vulnerabilitie… #ThreatVulnerability #TRU
English
0
4
12
1.1K
Brad Spengler
Brad Spengler@spendergrsec·
but if it asks some irrelevant/unsound etc question, that doesn't compute into the eval results
English
0
0
1
200
Brad Spengler
Brad Spengler@spendergrsec·
My issue with this eval of Sashiko is if you look at the review, almost everything I saw is phrased as a question instead of a statement. I guess that's why FPs weren't evaluated? If it asks a question and the question happened to expose a bug, it counts as finding the bug...
English
1
0
3
601
Brad Spengler
Brad Spengler@spendergrsec·
Careful with git.kernel.org/pub/scm/linux/…, the fixes tag will cause it to be backported lots of places, but it depends on "scsi: core: Move two statements" first introduced in 6.19
English
0
0
6
774
Brad Spengler
Brad Spengler@spendergrsec·
@FlorianHeigl1 @healeyio Whatever you think of the blog, I don't think the person(s) involved in the research had anything to do with it, also my understanding is the sudden release was forced by the rules of various mailing lists the issue was brought to (being the same day patches landed upstream)?
English
1
0
0
19
Andrew Healey
Andrew Healey@healeyio·
It seems we're still doing this. Not a good look from Qualys. Ubuntu, on the other hand, had a great, reasonable, measured write-up.
Andrew Healey tweet media
English
1
0
2
94
Brad Spengler
Brad Spengler@spendergrsec·
@_minipli Just to pass on the info, @_minipli mentions if you're interested in these bugs, -Wjump-misses-init is your fp-prone friend ;)
English
0
0
3
342
Brad Spengler
Brad Spengler@spendergrsec·
@_minipli ipc/mqueue.c:do_mq_notify() is asking for pain one day, kernel/futex/pi.c:futex_lock_pi() has to indent most of the function to avoid the problem, same in sound/usb/qcom/qc_audio_offload.c:enable_audio_stream(), no other current instances of the issue with a quick grep
English
1
0
1
558
Brad Spengler
Brad Spengler@spendergrsec·
Yikes, testing our 6.19 patch, the magic cleanup introduced into vfs_coredump() nearly got us. If you see "CLASS(x, y)(...)" at all, make sure you have no gotos prior to it going to a label after it. The compiler will not warn you at all, and you'll be doing cleanup on...
English
1
0
8
1.3K