Weaknesses of ASLR in the Kernel

This article took a while, so buckle up! Address Space Layout Randomization (not kASLR) ASLR - the bane of arbitrary write, and most exploits which, well, require an address. Luckily, we can defeat ASLR by leaking something. For example, by leaking the address of one libc function, you can calculate the location of any other libc global variable and function, in that process. And it affects everything! As long as it’s supported that is. If your libc and your target executable support PIE, you know nothing about any of the addresses. ...

February 16, 2025 · Denis Liubarsky