Rezultati pretraživanja
  1. 5. velj

    The incredible and presenting at on modifying to find Windows Kernel vulnerabilities

  2. 3. velj
  3. 26. stu 2019.

    let's see if I got the new set_tid feature sent for v5.5 into correctly: 🤞

  4. 26. stu 2019.

    We split different resources( based on “resource centric” in syzkaller ) by collecting different states triggered by them to generate( stack-based) new program. That's what we call state based fuzzer:

  5. 20. stu 2019.

    Minor out-of-bounds read in smk_set_cipso() root$ echo "test 1" > /sys/fs/smackfs/cipso2

    Prikaži ovu nit
  6. 20. stu 2019.
    Prikaži ovu nit
  7. 13. stu 2019.

    2019/12/13(金) 19:00-21:00に 「OSSセキュリティ技術の会 第七回勉強会」 として「syzkaller/syzbot」をテーマに勉強会を開催することになりました。是非御参加下さい。

  8. 6. stu 2019.

    fuzzer stresses kernels so much that frequently they can't even distinctly pronounce what happened to them. Today syzkaller+ invented a word that I love: sypzaknic (a mix of syzkaller and panic) Sounds like some local food in Eastern Europe...

    Prikaži ovu nit
  9. 3. stu 2019.

    Didn't receive any PRs for support in . So waiting for more KVM guest escapes and priv escalations. +more work for stable and all downstream maintainers to put down fires later. Stuff moar unfuzzed code into kernel! My job security goes through the roof

  10. 7. lis 2019.
    Odgovor korisnicima

    for ! Wow! Btw are there any getting started tutorials for for ? How do I connect/boot/update? Did not find any.

  11. 5. lis 2019.

    Trying to build for on La Frite from . So far swapping to a USB stick is giving the kernel a good workout.

  12. 3. lis 2019.

    It's fascinating to see changes like this due to your work: whole class of inbound IPv6 packets is now unconditionally dropped by all Linux machines out there right in ip6_rcv_core() because... nothing good will happen otherwise:

  13. 27. ruj 2019.

    The value of attending conferences like expressed in a single pr: Proper fuzzing support for codepaths. Spent a good hour with getting things in order. :) Now off to enjoy my last hours without bug reports. :)

  14. 27. ruj 2019.
  15. 12. ruj 2019.

    Had a great time working with the foundation as a part of GSoC'19. I worked on enchancing support for the kernel fuzzer.

  16. 7. ruj 2019.
    Odgovor korisniku/ci

    The syscall descriptions from the project might be useful here?

  17. 10. kol 2019.

    "RT RT a13xp0p0v: I wrote a post: "Case study: Searching for a vulnerability pattern in the Linux kernel". It's a funny story about , Semmle LGTM, Coccinelle and a "public 0day". "

  18. 10. kol 2019.

    I wrote a post: "Case study: Searching for a vulnerability pattern in the Linux kernel". It's a funny story about , , Coccinelle and a "public 0day".

  19. 8. kol 2019.

    is another "MATRIX" against the ones making mistakes/bugs constantly.

  20. "we have found around 70 unique crashes with syzkaller." すごぽよ。。。 / 1件のコメント “NetBSD Blog”

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.