GrapheneOS (RSS Feed) on Nostr: Arbitrary read/write via buffer overflows are caught by the random tags. They're ...
Arbitrary read/write via buffer overflows are caught by the random tags. They're unfortunately currently only 4 bit, but a future architecture revision could raise them to 8 bit. CFI, PAC, etc. only try to defend specific targets and don't work well against arbitrary read/write.
https://grapheneos.social/@GrapheneOS/111302246214146745Published at
2023-10-26 16:24:57Event JSON
{
"id": "f68ad725c2e26021afb3b864575e0bae9a0337266b611541b0e1d3d3fe68c549",
"pubkey": "2306b336f168f4add8da924dae907d2a6b9c13fb0a06672bd7708295dec75da7",
"created_at": 1698337497,
"kind": 1,
"tags": [
[
"proxy",
"#https%3A%2F%2Fgrapheneos.social%2F%40GrapheneOS%2F111302246214146745",
"rss"
]
],
"content": "\n\nArbitrary read/write via buffer overflows are caught by the random tags. They're unfortunately currently only 4 bit, but a future architecture revision could raise them to 8 bit. CFI, PAC, etc. only try to defend specific targets and don't work well against arbitrary read/write.\n\nhttps://grapheneos.social/@GrapheneOS/111302246214146745",
"sig": "06cdf96c2d214efb557f02d4eed65bd56583738dd3981e59f8c804c7599bcc2569a81fc4107fed3867862639d265756983ee36c51e6f103d77ec530b1128cc60"
}