CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit
CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit
Beating the #kCTF #PoW with AVX512IFMA for $51k https://anemato.de/blog/kctf-vdf
Learnings from #kCTF VRP's 42 #LinuxKernel exploits submissionshttps://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
Since its inception, the program has rewarded researchers with a total of 1.8 million USD, and in the past year, there has been a clear trend: 60% of the submissions exploited the #io_uring component of the #Linux #kernel (we paid out around 1 million USD for #io_uring alone). Furthermore, #io_uring vulnerabilities were used in all the submissions which bypassed our mitigations.
To protect our users, we decided to limit the usage of #io_uring in #Google products
🌗 Google 在線安全博客:kCTF VRP 的 42 個 Linux 內核漏洞提交的經驗教訓
➤ Google VRP 漏洞獎勵計劃的最新消息和見解
✤ https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
Google 在線安全博客分享了他們在 kCTF VRP 的 42 個 Linux 內核漏洞提交中所學到的經驗教訓,以及他們如何保護用戶和改變他們的計劃以對齊他們最感興趣的領域。其中,60% 的提交利用了 Linux 內核的 io_uring 組件,Google 已經限制了 io_uring 的使用,並將漏洞細節公開在他們的試算表上。此外,Google 還將他們的焦點從 GKE 和 kCTF 轉移到了最新的穩定內核和他們的緩解措施,並推出了新的名為“kernelCTF”的漏洞獎勵計劃。
+ 這篇文章很有用,讓我對 Google 的漏洞獎勵計劃有了更深入的了解。
+ Google
#安全 #Linux 內核 #漏洞 #Google VRP #kCTF #io_uring