Tavis Ormandy (@taviso) 's Twitter Profile
Tavis Ormandy

@taviso

Vulnerability researcher at Google. This is a personal stream, opinions expressed are mine. I'm also @[email protected]

ID: 14453232

linkhttps://lock.cmpxchg8b.com/ calendar_today20-04-2008 17:19:37

9,9K Tweet

134,134K Followers

644 Following

Steve Weis (@sweis) 's Twitter Profile Photo

If Google Project Zero finds a bug and your favorite intelligence agency finds a bug, someone you don't like will find the bug will too.

If Google Project Zero finds a bug and your favorite intelligence agency finds a bug, someone you don't like will find the bug will too.
Steven Sinofsky (@stevesi) 's Twitter Profile Photo

AV software has always always been the weak link in the security and quality chain, amazingly. But the catch-22 is that regulatory / legal systems have made liability such that NOT running this stuff goes against “best practices” and thus increases liability. That needs to end.

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

No surprises here, but CrowdStrike confirms Tavis Ormandy's analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"

No surprises here, but <a href="/CrowdStrike/">CrowdStrike</a> confirms <a href="/taviso/">Tavis Ormandy</a>'s analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"
Tavis Ormandy (@taviso) 's Twitter Profile Photo

I wasted a bunch of time trying to figure out why xterm starts so slowly on Windows... and solved it with a dumb LD_PRELOAD hack 😆 lock.cmpxchg8b.com/slowterm.html

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

This morning, we published the Root Cause Analysis (RCA) detailing the findings, mitigations and technical details of the July 19, 2024, Channel File 291 incident. We apologize unreservedly and will use the lessons learned from this incident to become more resilient and better

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

CrowdStrike This 100% matches our/Tavis Ormandy's conclusions derived from analyzing the crash report/disasm 🧠 RAX: input pointer array R11: index (0x14/20d) Accessing Array[20] retrieved the 21st item (as arrays are 0-based). This returned an invalid memory address that 💥'd when deref'd!

<a href="/CrowdStrike/">CrowdStrike</a> This 100% matches our/<a href="/taviso/">Tavis Ormandy</a>'s conclusions derived from analyzing the crash report/disasm 🧠

RAX:  input pointer array
R11: index (0x14/20d)

Accessing Array[20] retrieved the 21st item (as arrays are 0-based). This returned an invalid memory address that 💥'd when deref'd!
Mark Ermolov (@_markel___) 's Twitter Profile Photo

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀
SomeUnusualGames (@someunusualgame) 's Twitter Profile Photo

Hey! I made a game in Bash with raylib! It's a "bullet hell" game featuring beloved penguin Tux vs an evil mutant Window! Bash is a simple scripting language, so simple it doesn't have floating point variables/arithmetic! So how was this game possible? 👇