Dmitry Vyukov
@dvyukov
I tweet about fuzzing, bugs, sanitizers, security, hardening, kernels, syzkaller, Go, performance, concurrency, lock-free algorithms.
ID: 33580136
http://www.1024cores.net 20-04-2009 16:58:22
4,4K Tweet
8,8K Followers
375 Following
Linux kernel vulnerability analysis (CVE-2023-0179) and exploitation to achieve Local Privilege Escalation (LPE) Credits Davide Ornaghi (Davide Ornaghi) Part 1: betrusted.it/blog/64-bytes-… Part 2: betrusted.it/blog/64-bytes-… #lpe #infosec
Unknown Fluid Management roddux Canonical Ubuntu Both vulns where kernel interfaces that are historically root only (and therefore aren't as hardened vs untrusted input) are accessible to non-root who can exploit for LPE. CVE-2024-1086=>userns=>nftables, CVE-2025-0927=>polkit/FS_USERNS_MOUNT=>HFS+ (see Exploitability section)
Coincidentally this repeats a lot of what I explored during my thesis for fuzzing the Linux kernel TLDR- enriched corpus is empirically effective and more practical for improving fuzzer performance. sciencedirect.com/science/articl… Rohan Padhye Dmitry Vyukov
External fuzzing of USB drivers with Syzkaller docs.google.com/presentation/d… Credits Andrey Konovalov #infosec #fuzzing
Coroutine Frame-Oriented Programming: Breaking Control Flow Integrity by Abusing Modern C++ i.blackhat.com/BH-USA-25/Pres… Marcos Bajo(Marcos Bajo) & Christian Rossow(Christian Rossow (@[email protected]))
Here’s the source code of our #AIxCC winning team Team Atlanta, enjoy! github.com/Team-Atlanta/a… More things TBA
Dmitry Vyukov Theori Trail of Bits FWIW, Trail of Bits spent the last month divorcing our system from the competition framework so you can run it on your laptop against real codebases. github.com/trailofbits/bu…