| 
	 Navigation 
		
	Recherche 
		 | 
					
						Defeating KASLR by Doing Nothing at All (Project Zero)
	mardi  4 novembre 2025, 00:59 , par LWN.net
 
The Project Zero blog explains 
that, on 64-bit Arm systems, the kernel's direct map is always placed at the same virtual location, regardless of whether kernel address-space layout randomization (KASLR) is enabled. While it remains true that KASLR should not be trusted to prevent exploitation, particularly in local contexts, it is regrettable that the attitude around Linux KASLR is so fatalistic that putting in the engineering effort to preserve its remaining integrity is not considered to be worthwhile. The joint effect of these two issues dramatically simplified what might otherwise have been a more complicated and likely less reliable exploit. 
https://lwn.net/Articles/1044867/
 
	Voir aussi | 
					
	
	
				
	 56 sources (32 en français) 
		
 
 Date Actuelle 
		
			mar.  4 nov. - 11:57 CET	
	
		 
	 | 
				








