Google looks at bypass in Chromium's ASLR security defense,

Google looks at bypass in Chromium's ASLR security defense, throws hands up, won't patch garbage issue


Engineers write off GC abuse because Spectre broke everything anyway
Share
Copy
In early November, a developer contributing to Google's open-source Chromium project reported a problem with Oilpan, the garbage collector for the browser's Blink rendering engine: it can be used to break a memory defense known as address space layout randomization (ASLR).
About two weeks later, Google software security engineer Chris Palmer marked the bug "WontFix" because Google has resigned itself to the fact that ASLR can't be saved – Spectre and Spectre-like processor-level flaws can defeat it anyway, whether or not Oilpan can be exploited.
Or as Palmer put it, "we already have to plan for a world in which ASLR is bypassable."

Related Keywords

Richard Johnson , Chris Palmer , Johnathan Norman , Google , Google Vulnerability Reward Program , Vrije Universiteit Amsterdam , Microsoft Edge , Native Client , Vulnerability Reward Program , Security , Software , ரிச்சர்ட் ஜான்சன் , கிறிஸ் பாமர் , ஜொனாதன் நார்மன் , கூகிள் , மைக்ரோசாஃப்ட் விளிம்பு , பூர்வீகம் வாடிக்கையாளர் , பாதுகாப்பு , மென்பொருள் ,

© 2025 Vimarsana