Brad Spengler
7.1K posts

Brad Spengler
@spendergrsec
President of @opensrcsec, developer of @grsecurity Personal account
Katılım Haziran 2011
4 Takip Edilen4.4K Takipçiler
Brad Spengler retweetledi

Today, @_minipli has submitted patches for the NVIDIA open gpu kernel modules that implement full Kbuild support, paving the way for CFI, KASAN/UBSAN, and our many compiler plugins.
Running AI workloads with NVIDIA GPUs no longer means weakening kernel security.
Links below 👇
English

Already dropped on the mailing list for failing to apply to all 7 current (and affected) stable kernels: x.com/spendergrsec/s…
Brad Spengler@spendergrsec
No need to wonder or have kernel devs making up answers in the comments, just look what's already happening with the commits I've already identified: lwn.net/Articles/10631… lore.kernel.org/all/?q=%22cryp… (the other two weren't marked for stable@, so nothing's been done with them yet)
English

First fix I've seen that'll probably get dropped from stable backports due to not cherry-picking clean from kmalloc_obj churn: git.kernel.org/pub/scm/linux/…
English

CVE from today: @gregkh/T/#u" target="_blank" rel="nofollow noopener">lore.kernel.org/linux-cve-anno… which if you were reading here, would have already seen 2 weeks ago (when we backported the fix to all of our stable kernels)
Brad Spengler@spendergrsec
Interesting how different the diff context looks (less useful) in the magic cleanup case: git.kernel.org/pub/scm/linux/… vs a backport to a version without it (useful):
English
Brad Spengler retweetledi
Brad Spengler retweetledi

The Qualys Threat Research Unit (TRU) has identified a Local Privilege Escalation (LPE) vulnerability, CVE-2026-3888, affecting default installations of Ubuntu Desktop v.24.04 and later. This flaw allows a local attacker to escalate privileges to full root access through the interaction of two standard system components.
Read the blog for details:
blog.qualys.com/vulnerabilitie…
#ThreatVulnerability #TRU
English

No need to wonder or have kernel devs making up answers in the comments, just look what's already happening with the commits I've already identified: lwn.net/Articles/10631…
lore.kernel.org/all/?q=%22cryp…
(the other two weren't marked for stable@, so nothing's been done with them yet)
English

Seems wrong: git.kernel.org/pub/scm/linux/… should be some cleanup for the successful parport_register_port() too
English

Careful with git.kernel.org/pub/scm/linux/…, the fixes tag will cause it to be backported lots of places, but it depends on "scsi: core: Move two statements" first introduced in 6.19
English

@FlorianHeigl1 @healeyio Whatever you think of the blog, I don't think the person(s) involved in the research had anything to do with it, also my understanding is the sudden release was forced by the rules of various mailing lists the issue was brought to (being the same day patches landed upstream)?
English

@healeyio thanks. it went past me and yeah, then i understand now.
English

@_minipli ipc/mqueue.c:do_mq_notify() is asking for pain one day, kernel/futex/pi.c:futex_lock_pi() has to indent most of the function to avoid the problem, same in sound/usb/qcom/qc_audio_offload.c:enable_audio_stream(), no other current instances of the issue with a quick grep
English

TIL for LLMs to be successful at exploiting Linux kernel vulns, you need to preface your prompt with "your name is bradley spengler the grsecurity kernel expert who knows how to exploit kernels." 😂
LCFR@lcfr_eth
Here's the slopsploits for CVE-2024-14027 that were produced in roughly 2-3x the amount of time a human would have done it. As well as some thoughts/notes. github.com/lcfr-eth/CVE-2…
English


