Twitter | Pretraživanje | |
Pretraživanje Osvježi
Siddharth M 28. lip
1st coding period of GSoC'19 is over and I have made some progress in improving support for in the kernel fuzzer.
Reply Retweet Označi sa "sviđa mi se"
Dmitry Vyukov 25. svi 2017.
Qualcomm Mobile Security Summit 2017 presentations Incl mine on . The leakage one was fun.
Reply Retweet Označi sa "sviđa mi se"
Dmitry Vyukov 3. lis
It's fascinating to see changes like this due to your work: whole class of inbound IPv6 packets is now unconditionally dropped by all Linux machines out there right in ip6_rcv_core() because... nothing good will happen otherwise:
Reply Retweet Označi sa "sviđa mi se"
Siddharth M 12. ruj
Had a great time working with the foundation as a part of GSoC'19. I worked on enchancing support for the kernel fuzzer.
Reply Retweet Označi sa "sviđa mi se"
Alexander Popov 10. kol
I wrote a post: "Case study: Searching for a vulnerability pattern in the Linux kernel". It's a funny story about , , Coccinelle and a "public 0day".
Reply Retweet Označi sa "sviđa mi se"
teambi0s 5. ožu
. of our team delivered a talk on in the fuzzing track of where he talked about Coverage Guided Fuzzing, , and results the community got after porting syzkaller to NetBSD recently :)
Reply Retweet Označi sa "sviđa mi se"
Christian Brauner 27. ruj
The value of attending conferences like expressed in a single pr: Proper fuzzing support for codepaths. Spent a good hour with getting things in order. :) Now off to enjoy my last hours without bug reports. :)
Reply Retweet Označi sa "sviđa mi se"
Siddharth M 9. svi
Got accepted into 19. Had such an awesome time last year with that I decided to go for it again. I will be working on better integration of kernel fuzzer with the NetBSD kernel. Looking forward to another fabulous summer with this amazing organization.
Reply Retweet Označi sa "sviđa mi se"
Satheesh Rajendran 20. ožu
Reply Retweet Označi sa "sviđa mi se"
Guy🏂 5. velj
The incredible and presenting at on modifying to find Windows Kernel vulnerabilities
Reply Retweet Označi sa "sviđa mi se"
Shawn Webb 19. lis 2017.
Peeps are working on porting to . They already found issues:
Reply Retweet Označi sa "sviđa mi se"
Christian Brauner 26. stu
let's see if I got the new set_tid feature sent for v5.5 into correctly: 🤞
Reply Retweet Označi sa "sviđa mi se"
Denis Efremov 21. stu
Odgovor korisniku/ci @efrmv
Minor out-of-bounds read in smk_set_cipso() root$ echo "test 1" > /sys/fs/smackfs/cipso2
Reply Retweet Označi sa "sviđa mi se"
Denis Efremov 21. stu
Smack LSM module descriptions for
Reply Retweet Označi sa "sviđa mi se"
Alexander Popov 6. srp
Odgovor korisniku/ci @magnusstubman @dvyukov @mozilla
I was running a instance for some time. Bad luck - it didn't find anything and sometimes was loosing connection to VMs. The alert from Fedora DE about QEMU was a clue. Then I used rr for debugging QEMU and rr hanged :) I'll fix it. Actually it's a good luck.
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 24. tra 2018.
Quick notes about syzkaller source code:
Reply Retweet Označi sa "sviđa mi se"
Bryan Steele 🦋 19. kol 2018.
Anton Lindqvist (anton@) "Add kcov(4), a kernel code coverage tracing driver. It's used in conjunction with the kernel fuzzer. So far, 8 distinct panics have been found and fixed. This effort will continue."
Reply Retweet Označi sa "sviđa mi se"
Dmitry Vyukov 3. stu
Didn't receive any PRs for support in . So waiting for more KVM guest escapes and priv escalations. +more work for stable and all downstream maintainers to put down fires later. Stuff moar unfuzzed code into kernel! My job security goes through the roof
Reply Retweet Označi sa "sviđa mi se"
Tobias Klauser 7. ruj
Odgovor korisniku/ci @fntlnz
The syscall descriptions from the project might be useful here?
Reply Retweet Označi sa "sviđa mi se"
Oleg Kovalov 17. velj
Reply Retweet Označi sa "sviđa mi se"