Defeating KASLR by doing nothing at all

googleprojectzero.blogspot.com

102 points by aa_is_op 6 days ago


Hendrikto - a day ago

> I reported these two separate issues, lack of linear map randomization, and kernel lands at static physical address in Pixel, to the Linux kernel team and Google Pixel respectively. However both of these issues are considered intended behavior. While Pixel may introduce randomized physical kernel load addresses at some later point as a feature, there are no immediate plans to resolve the lack of randomization of the Linux kernel’s linear map on arm64.

Funny how Google is paying people to find exploits in their product, and also pays people to ignore those vulnerability reports.

Pixels seem to be pretty secure when running Graphene, from what I have heard.

nolist_policy - a day ago

The post on lwn.net has some more context in the comments:

https://lwn.net/Articles/1044867/

i-con - a day ago

This, having the whole physical memory mapped all the time, reminds me of a another issue that was exploitable in KVM hypervisors [1]. I wonder what is the reason to have it all mapped? Not everybody seems to do it.

[1] https://www.vusec.net/projects/rain/

rvz - a day ago

Great writeup as always from project zero and this could not possibly have been generated by an AI, nor did the author ever use an AI to find this very powerful vulnerability.