Brad Spengler Profile
Brad Spengler

@spendergrsec

Followers
4K
Following
810
Media
492
Statuses
7K

President of @opensrcsec, developer of @grsecurity Personal account

Joined June 2011
Don't wanna be here? Send us removal request.
@spendergrsec
Brad Spengler
2 days
Submissions have closed for this one, as anyone can read the answer in today's patches :)
0
0
0
@spendergrsec
Brad Spengler
2 days
still has 132 more CVE fixes than the final 5.4 upstream release from this month (two years later). Food for thought!
1
0
3
@spendergrsec
Brad Spengler
2 days
Was just taking a look at our CVE system (which can generate all kinds of charts on demand, like who the worst reviewers are by counts of CVEs normalized by the number of reviews by the person), anyway, apparently our 5.4 kernel that we discontinued the beginning of 2024...
1
0
2
@spendergrsec
Brad Spengler
3 days
Paper does have some new stuff it seems actually that wasn't discussed in 2013, parent notify on devices that don't have o+r/o+w
0
0
1
@spendergrsec
Brad Spengler
3 days
0
0
5
@spendergrsec
Brad Spengler
3 days
Timeline: Jan 7 2013: Mail about attack Jan 18 2013: Attack dead in grsec December 18 2025: Patch lands upstream
1
0
6
@spendergrsec
Brad Spengler
3 days
Mail from 2013 about it:
1
0
3
@spendergrsec
Brad Spengler
3 days
Sounds like what was already known and ignored for the past 13+ years upstream that we addressed in grsec back then:
2
0
5
@spendergrsec
Brad Spengler
3 days
3
2
18
@spendergrsec
Brad Spengler
3 days
And for today's final 6.17 send-off, 3 known-broken backports with fixes already available Nov 25, Dec 10, and Oct 24.
@spendergrsec
Brad Spengler
5 days
https://t.co/5IJ0ccuqX2 "making this part of a script that I now run much more frequently to ensure that we do not miss any “fixups for the fixes” when doing stable kernel releases." Since we keep finding mistakes on every release, I guess we know who has the better tools 🤓
0
0
2
@spendergrsec
Brad Spengler
3 days
Think about how this commit would be interpreted in terms of naive fixes tag analysis for CVEs:
0
0
1
@spendergrsec
Brad Spengler
3 days
slight delay, going out today
0
0
0
@spendergrsec
Brad Spengler
3 days
Was just working in this same file a few days ago for a different reason:
0
0
0
@spendergrsec
Brad Spengler
4 days
Fire up your AI engines nerds, can you spot the bug @_minipli found in a few minutes in this tested/reviewed code?
5
0
10
@spendergrsec
Brad Spengler
4 days
Beside that, it failed in exactly the spot people should know there was a potential for failure, and no that doesn't in any way make it C-equivalent. My useless 2c, I'm not a fanboy for anything, I only care about facts.
1
0
3
@spendergrsec
Brad Spengler
4 days
I would like to know more about the claims of it being 'just' a crash though and what that's based on. Specifically, how did it end up trying to access some bogus address above 48bit VA space but not in kernel space, and is there any possible control over it?
1
0
4
@spendergrsec
Brad Spengler
4 days
Getting messaged a lot about the Rust CVE - for the record, most of the takes I see are majorly overblowing it/wrong (in a "see, no better than C, told you so!" way), even people who should know better (fil-c author) claiming the presence of 'unsafe' makes the whole thing useless
1
5
13
@h0mbre_
h0mbre
5 days
the algorithm is so trash now, i RT a well written blogpost/article about multiple relevant Mediatek driver bugs to 15k followers and it accumulated two RTs...
5
2
56
@spendergrsec
Brad Spengler
5 days
It better stop soon, I don't know how much more I can take of seeing exploit after exploit of the Linux kernel using techniques that have been dead in grsecurity for ages. Page table this, freelist that, is a Q4 bonus for someone at Twitter really worth inflicting all this? 😭
1
0
5
@spendergrsec
Brad Spengler
5 days
A lot more that could have been covered in our mail, but it's a good sampling at least. We'll save some of the items to discuss in more detail next year, lots of exciting stuff in the works (even some things that will help non-customers)
0
0
3