
Dmitry Vyukov
@dvyukov
I tweet about fuzzing, bugs, sanitizers, security, hardening, kernels, syzkaller, Go, performance, concurrency, lock-free algorithms.
ID: 33580136
http://www.1024cores.net 20-04-2009 16:58:22
4,4K Tweet
8,8K Takipçi
375 Takip Edilen



Linux kernel vulnerability analysis (CVE-2023-0179) and exploitation to achieve Local Privilege Escalation (LPE) Credits Davide Ornaghi (Davide Ornaghi) Part 1: betrusted.it/blog/64-bytes-… Part 2: betrusted.it/blog/64-bytes-… #lpe #infosec



Unknown Fluid Management roddux Canonical Ubuntu Both vulns where kernel interfaces that are historically root only (and therefore aren't as hardened vs untrusted input) are accessible to non-root who can exploit for LPE. CVE-2024-1086=>userns=>nftables, CVE-2025-0927=>polkit/FS_USERNS_MOUNT=>HFS+ (see Exploitability section)








Coincidentally this repeats a lot of what I explored during my thesis for fuzzing the Linux kernel TLDR- enriched corpus is empirically effective and more practical for improving fuzzer performance. sciencedirect.com/science/articl… Rohan Padhye Dmitry Vyukov

External fuzzing of USB drivers with Syzkaller docs.google.com/presentation/d… Credits Andrey Konovalov #infosec #fuzzing



Coroutine Frame-Oriented Programming: Breaking Control Flow Integrity by Abusing Modern C++ i.blackhat.com/BH-USA-25/Pres… Marcos Bajo(Marcos Bajo) & Christian Rossow(Christian Rossow (@[email protected]))

Here’s the source code of our #AIxCC winning team Team Atlanta, enjoy! github.com/Team-Atlanta/a… More things TBA

Dmitry Vyukov Theori Trail of Bits FWIW, Trail of Bits spent the last month divorcing our system from the competition framework so you can run it on your laptop against real codebases. github.com/trailofbits/bu…