|
Message-ID: <da14cfdfa8a410fd8589ad93f7e6a9eb271f52b1.camel@debian.org> Date: Thu, 11 Jul 2024 21:06:40 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: ASLRn't is still alive and well on x86 kernels, despite CVE-2024-26621 patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On Thu, 2024-07-11 at 09:07 +0200, Yves-Alexis Perez wrote: > > If you want to see the lack of randomization, try the test with an x86 > > kernel, not amd64. > > I don't have one at hand unfortunately, but I'll try setting up a VM or > something just to be sure. Thanks. So I did try with an x86 VM and it does confirm your finding. On an unstable kernel the simple `cat /proc/self/maps |grep libc.so |head -n1` (with libc6 on x86 beeing more than 2M) I get no randomness at all. Regards, - -- Yves-Alexis -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmaQLUAACgkQ3rYcyPpX RFvWbAgAy9nuAhjaNtgT7zBs1/Th5E4/veuUQWdkh4CUbaRjpndmYI9fWGVxtyfh p1xc10mkxVi0onVw5hwd3fb3GxvSCtZEDfFG/8qfAC5wIn05/ZvKyZvaBySYMqSm au1tgM1A0CPrsbcf0wVJoE+hoQnGBl/d2fvd3cp9fDV3+ItYtbzH5XIgRugaGkfz 3kx+CK8kM5FbtWZ12ZkERXbvIUf8vqTuGbfqR3M6g3w8eqBqzkmi8TQcbhOP1X4N G0aJe3K5omlz77wxrCxBfBCT37uhPT6ljfJYaRUWhGXzT3UACmqM9QXu30/XBgjd rl9bGcbbvQJ+h5WZady6GLEQZg/Qsw== =Mbeb -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.