Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

So What Does Polymorphic Linux® Fix?

By Shaina Raskin

Polyverse’s Polymorphic versions of popular Linux distribution protect against memory-based cyberattacks, such as buffer overflows, ROP attacks, and even hardware-based exploits like Spectre.

More than two-thirds of the vulnerabilities disclosed in 2017 were exploitable by memory-based cyberattacks. Polyverse mitigates all of them.


Polyverse’s polymorphic versions of popular Linux distributions work on a very simple idea: provide identical functionality to the standard Linux distributions, but with binaries that are thoroughly scrambled.

A scrambled binary is a standard ELF binary for the appropriate chipset (e.g., x86). There is no obfuscation or encryption, it’s just a binary. However, by scrambling, details of that binary are different than the standard binary distributions.

For example, Polyverse changes the location of functions with a binary (e.g., shared library (dlls), executables, etc.): which registers are being used, the layout of import tables, and so forth. The net result is a binary where nearly every line of machine code is different.

See our website for more information on Polyverse’s polymorphic process.

Attack Vectors Mitigated

The net effect of these changes is to mitigate any cyberattacks that rely on knowing details of the target binary. These attack techniques include (but are not limited to):

· Buffer overflow:

· Integer overflow:

· Use After Free:

· Stack/heap clash:

· ROP attacks (return oriented programming):

· JOP attacks (jump oriented programming):

· Return-to-libc:

· Spectre:

Essentially, each of these attack techniques relies on two fundamental pieces:

1. A software bug.

2. Detailed knowledge of the binary layout and memory usage of the victim; e.g., specific instruction sequences for ROP gadgets, what data is in what register, and so forth.

Overall, these account for approximately 70% of all of high-severity vulnerabilities (CVSS score 8 or greater) that are exploitable by memory-based attacks according to the data on The vulnerability categories of “executive arbitrary code, memory corruption, and overflow vulnerabilty” are directly mitigated by Polyverse technologies.

Even when expanded out to all vulnerabilities, memory-based vulnerabilities still represent approximately half of all vulnerabilities since 1999.

Figure 1 Vulnerabilities by type since 1999


The following writeups have more specific information on how Polyverse mitigates specific memory-based exploits:

1. Defeating Spectre:

2. Readhook Zero Day Simulator:, with a corresponding video demo at:

3. Kernel based ROP analysis:

4. Tutorial on ROP based attacks, including the EnVizen analysis tool:

Interested in learning more?

Be the first to hear about the latest product releases and cybersecurity news.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.