
Kees Cook
@kees_cook
Followers
5K
Following
399
Media
24
Statuses
435
Thank you @samitolvanen, Peter, Joao, @nullmodem, @embeddedgus, @nathanchance, Nick, Sedat, Josh, and everyone else who helped get KCFI developed and landed!.
2
9
41
So many interesting finds in this research! I struggle to fit even one in a tweet:. ". while we may not be decreasing the # of vulns. there are indications [of] . a notion of maturity, where vulns will be mostly absent from code older than a specific point in the past.".
How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes | USENIX
0
1
10
Fantastic write-up, confirms the benefits of CFI and auto-var-init:. "automatic variable initialization . kill[s] a whole class of bugs, but it also breaks some useful exploit primitives.". "[kernel]CFI is arguably the mitigation that takes the most effort to bypass".
This is probably the most complex exploit I've done so far. A UAF in Android kernel freed by kfree_rcu (introduces a delay) in a tight race + kCFI + Samsung RKP. Yet its still possible to gain arbitrary kernel RW, disable SE and root from untrusted app.
0
2
30
@fugueish: "A big part of the purpose — or, potential — for public vulnerability announcements and reports is to teach and learn, mature the engineering culture, and above all to avoid repeating these problems". i.e. "actually describe the flaw in detail".
1
1
11