Advertisement ยท 728 ร— 90

Posts by grsecurity

Preparatory patches: github.com/NVIDIA/open-...

Full Kbuild support: github.com/NVIDIA/open-...

#grsecurity compatibility: github.com/NVIDIA/open-...

1 month ago 0 0 0 0

Today, Mathias Krause of our team has submitted patches for the NVIDIA open gpu kernel modules that implement full Kbuild support, paving the way for CFI, KASAN/UBSAN, and our many compiler plugins.

Running AI workloads with NVIDIA GPUs no longer means weakening kernel security.

Links below ๐Ÿ‘‡๏ธ

1 month ago 0 0 1 0

Our 6.18 #grsecurity LTS release, to be supported through at least the end of 2028, is now available!

2 months ago 0 0 0 0

Just sent out our year end wrap-up mail to customers. It's a bit bigger than usual, so grab yourself some Swiss Miss and enjoy!

If you didn't receive it, but should have, just reach out and we'll make sure you're on the list.

Happy holidays!

4 months ago 1 0 0 0

6.18 has been selected as the next #grsecurity stable kernel version, to be supported through the end of 2028, one year longer than the upstream LTS EOL date of Dec 2027.

4 months ago 0 0 0 0

Quick reminder that our 6.8 short-term stable kernel goes EOL at the end of this month. Some stats: over the period of a year, it included over 1500 security/stability-relevant backports.

9 months ago 0 0 0 0
Post image

Nice demo: tested a vulnerable Ubuntu 22.04 system for glibc CVE-2025-4802 using Solar Designer's PoC adapted to Ubuntu (replace any occurrence of "myhostname" with "mdns4_minimal"). Even an old #grsecurity 5.4.96 kernel from February 8 2021 prevented exploitation

10 months ago 0 0 0 0

It's now available!

1 year ago 0 0 0 0

We expect our 6.13 #grsecurity beta to be available within the next two weeks.

1 year ago 0 0 0 1
Advertisement
Preview
AMD: Microcode Signature Verification Vulnerability ### Summary Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...

github.com/google/secur...

1 year ago 0 1 0 0

Our 6.12 #grsecurity beta is now available to beta testers for testing

1 year ago 0 0 0 0

Slides for Pawel's H2HC presentation this month on the TLB are now available on grsecurity.net/papers
If you've never heard of "paging-structure caches" before, check it out!

1 year ago 0 0 0 0

We need to post a correction to yesterday's eBPF performance numbers:
Mathias Krause wasn't happy with just a 30x speedup and took a look at one final bottleneck that was bothering him.
The speedup over vanilla is now 747x ๐Ÿคฏ (5.27s vs 1h5m40s)

1 year ago 1 0 0 0
[PATCH bpf-next 0/3] test_bpf.ko blinding fixes - Mathias Krause

Testcase fixes were sent upstream by Mathias Krause here: lore.kernel.org/bpf/20241104...

1 year ago 0 0 0 0

If you're curious, we also fixed the failing vanilla testcases, without which the speedup would have appeared even larger than 30x. Every grsecurity option really means every single one, including RAP, PRIVATE_KSTACKS, KERNEXEC, UDEREF, AUTOSLAB, KERNSEAL, etc.

1 year ago 0 0 1 0
Post image Post image

Performance isn't the enemy of security: we care about both. Today's patches finish off a set of security/performance improvements to eBPF. Below we show a ~30x speedup vs vanilla in running the eBPF selftests with every single #grsecurity option enabled!

1 year ago 1 0 1 1

Johannes Wikner has published a detailed walkthrough of the first cross-process Spectre exploit against a real target, an attack he developed in part during his internship with us last year.
Check it out here: grsecurity.net/cross_proces...

1 year ago 0 2 0 0
Advertisement

A new version of paxctld (1.2.6) is now available for download!

1 year ago 2 1 0 0