#kCTF

2025-07-10

CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit

qriousec.github.io/post/cve-20

st1nger :unverified: 🏴‍☠️ :linux: :freebsd:st1nger@infosec.exchange
2025-06-03

Beating the #kCTF #PoW with AVX512IFMA for $51k anemato.de/blog/kctf-vdf

2023-09-30

Escaping the Google #kCTF Container with a Data-Only #Exploit

h0mbre.github.io/kCTF_Data_Onl

2023-08-01

Escaping the #Google #kCTF Container with a Data-Only #Exploit

// by @h0mbre_@twitter.com

h0mbre.github.io/kCTF_Data_Onl

#InfoSec
Learnings from #kCTF VRP's 42 #LinuxKernel exploits submissions
Since its inception, the program has rewarded researchers with a total of 1.8 million USD, and in the past year, there has been a clear trend: 60% of the submissions exploited the #io_uring component of the #Linux #kernel (we paid out around 1 million USD for #io_uring alone). Furthermore, #io_uring vulnerabilities were used in all the submissions which bypassed our mitigations.

To protect our users, we decided to limit the usage of #io_uring in #Google products
https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
GripNewsGripNews
2023-06-16

🌗 Google 在線安全博客:kCTF VRP 的 42 個 Linux 內核漏洞提交的經驗教訓
➤ Google VRP 漏洞獎勵計劃的最新消息和見解
security.googleblog.com/2023/0
Google 在線安全博客分享了他們在 kCTF VRP 的 42 個 Linux 內核漏洞提交中所學到的經驗教訓,以及他們如何保護用戶和改變他們的計劃以對齊他們最感興趣的領域。其中,60% 的提交利用了 Linux 內核的 io_uring 組件,Google 已經限制了 io_uring 的使用,並將漏洞細節公開在他們的試算表上。此外,Google 還將他們的焦點從 GKE 和 kCTF 轉移到了最新的穩定內核和他們的緩解措施,並推出了新的名為“kernelCTF”的漏洞獎勵計劃。
+ 這篇文章很有用,讓我對 Google 的漏洞獎勵計劃有了更深入的了解。
+ Google
內核 VRP

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst