Pawel Wieczorkiewicz (@wipawel) 's Twitter Profile
Pawel Wieczorkiewicz

@wipawel

Low Level Security: CPUs, Kernels, Hypervisors and the like. I mostly break stuff. Offensive side of things.

ID: 1132296122

linkhttps://grsecurity.net calendar_today29-01-2013 22:32:36

973 Tweet

1,1K Followers

379 Following

Eduardo Vela (@sirdarckcat) 's Twitter Profile Photo

Back in H2HC last week, Jordy Zomer and me presented this tool we've been working on (with Artem) we now call "🐧 Kernel Explorer". It's still early on, I'll work on FF and a11y next! storage.googleapis.com/kernelctf-dash… storage.googleapis.com/kernelctf-dash… Code is github.com/google/securit…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡
Matteo Rizzo (@_matteorizzo) 's Twitter Profile Photo

github.com/google/securit… Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!

Anderson Nascimento (@andersonc0d3) 's Twitter Profile Photo

Blog post I wrote about an unexpectedly vulnerability we discovered in the TCP subsystem of the Linux kernel. This one is interesting because it can lead to a UAF even with the reference counter saturation mechanism present. I hope you enjoy it.

Brad Spengler (@spendergrsec) 's Twitter Profile Photo

So reachable WARNs get auto-CVE'd by the Linux CNA purely from the possibility of panic_on_warn, a reachable BUG() reported by a researcher needs an essay on threat models before anyone does anything with it. 🤔

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Brad Spengler (@spendergrsec) 's Twitter Profile Photo

We are looking for a PhD student intern this summer to research optimal heuristics for a new feature of ours that provides finer-grained, context-aware control over fragmentation in the Linux buddy allocator. Fully remote, please email hiring@ if interested.

Gabriel Negreira Barbosa (@gabrielnb) 's Twitter Profile Photo

IEEE SecDev 2025 (Practitioner Session) CFP is open until May 30th. Submit papers up to 2 pages about perspectives/insights for secure systems: …cdev25-practitioner.ieee-security.org Questions: [email protected] More info: secdev.ieee.org/2025/practitio…

Rodrigo Branco (@bsdaemon) 's Twitter Profile Photo

IEEE SecDev 2025 IEEE Secure Development (Practitioner Session) CFP is open until May 30th. This is the ideal mix between academic and industry session, with very short paper lenght requirements (2 pages) and a very pragmatic commitee. Work in progress projects and idea discussions are

Brad Spengler (@spendergrsec) 's Twitter Profile Photo

Another small demo, using the gadget from download.vusec.net/papers/halfspe… I revert the upstream 2023 fix and show Respectre handling the half Spectre gadget:

Another small demo, using the gadget from download.vusec.net/papers/halfspe…  I revert the upstream 2023 fix and show Respectre handling the half Spectre gadget:
Brad Spengler (@spendergrsec) 's Twitter Profile Photo

Vulnerability introduced into the upstream 5.15 and 6.6 LTS (and maybe others), another instance of turning mitigations into no-ops :\

Pawel Wieczorkiewicz (@wipawel) 's Twitter Profile Photo

I don’t understand what’s the fuss about. This looks like old news to me. I exploited hypervisors using this technique back in 2018/2019. Just use grsecurity KERNSEAL and forget about this kind of problems.