Tavis Ormandy (@taviso) 's Twitter Profile
Tavis Ormandy

@taviso

Vulnerability researcher at Google. This is a personal stream, opinions expressed are mine. I'm also @[email protected]

ID: 14453232

linkhttps://lock.cmpxchg8b.com/ calendar_today20-04-2008 17:19:37

9,9K Tweet

130,130K Followers

627 Following

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

No surprises here, but CrowdStrike confirms Tavis Ormandy's analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"

No surprises here, but <a href="/CrowdStrike/">CrowdStrike</a> confirms <a href="/taviso/">Tavis Ormandy</a>'s analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"
Tavis Ormandy (@taviso) 's Twitter Profile Photo

I wasted a bunch of time trying to figure out why xterm starts so slowly on Windows... and solved it with a dumb LD_PRELOAD hack 😆 lock.cmpxchg8b.com/slowterm.html

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

This morning, we published the Root Cause Analysis (RCA) detailing the findings, mitigations and technical details of the July 19, 2024, Channel File 291 incident. We apologize unreservedly and will use the lessons learned from this incident to become more resilient and better

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

CrowdStrike This 100% matches our/Tavis Ormandy's conclusions derived from analyzing the crash report/disasm 🧠 RAX: input pointer array R11: index (0x14/20d) Accessing Array[20] retrieved the 21st item (as arrays are 0-based). This returned an invalid memory address that 💥'd when deref'd!

<a href="/CrowdStrike/">CrowdStrike</a> This 100% matches our/<a href="/taviso/">Tavis Ormandy</a>'s conclusions derived from analyzing the crash report/disasm 🧠

RAX:  input pointer array
R11: index (0x14/20d)

Accessing Array[20] retrieved the 21st item (as arrays are 0-based). This returned an invalid memory address that 💥'd when deref'd!
Mark Ermolov (@_markel___) 's Twitter Profile Photo

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀
SomeUnusualGames (@someunusualgame) 's Twitter Profile Photo

Hey! I made a game in Bash with raylib! It's a "bullet hell" game featuring beloved penguin Tux vs an evil mutant Window! Bash is a simple scripting language, so simple it doesn't have floating point variables/arithmetic! So how was this game possible? 👇

Tavis Ormandy (@taviso) 's Twitter Profile Photo

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡
Perri Adams (@perribus) 's Twitter Profile Photo

Back in 2023, the assessment of the pre-authentication vulnerability in SSH was that it wasn't exploitable on Linux. For my OffensiveCon 2025 keynote, I wrote enough of an exploit to show, with the right heap groom and stabilization, it's likely exploitable. Then I tried to have