Maher Azzouzi

153 posts

Maher Azzouzi banner
Maher Azzouzi

Maher Azzouzi

@maherazz2

Vulnerability Research & Exploit Development

参加日 Eylül 2022
420 フォロー中1.2K フォロワー
Maher Azzouzi
Maher Azzouzi@maherazz2·
Reported ZDI-CAN-28490 (CVSS 7.5). A Linux kernel bug in the ETS qdisc within the packet scheduler subsystem. A logic flaw + race can leave a freed qdisc on an internal list, letting an unprivileged user trigger a UAF and gain kernel-level privilege escalation.
Maher Azzouzi tweet mediaMaher Azzouzi tweet media
English
2
5
55
6.2K
Maher Azzouzi
Maher Azzouzi@maherazz2·
No more POC tickets? @POC_Crew. Wanted to visit this year’s edition, it seems im a bit late
English
2
0
2
1.7K
Maher Azzouzi
Maher Azzouzi@maherazz2·
AMD August 2025 Security Bulletins (AMD-SB-6018 and AMD-SB-5007) feature my discovery CVE-2024-36342, a heap overflow in the @AMD GPU driver, rated with the highest severity in AMD-SB-5007 and listed among the most severe vulnerabilities in AMD-SB-6018. amd.com/en/resources/p…
English
0
0
14
1.6K
Alexander Popov
Alexander Popov@a13xp0p0v·
@maherazz2 @PwnieAwards For winning races, I usually employ this trick: I empirically define min timeout, max timeout, and step value. Then I try hitting the race condition in a loop increasing the timeout from min to max adding step. For some races, I can find params giving a sufficient success rate.
English
1
0
2
241
Alexander Popov
Alexander Popov@a13xp0p0v·
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Alexander Popov tweet mediaAlexander Popov tweet media
English
4
85
261
34.2K
Maher Azzouzi
Maher Azzouzi@maherazz2·
@a13xp0p0v @PwnieAwards Thank you so much for clarifying! Just curious — was this always reliable for you, or did the interrupt sometimes miss the window? And when you say gradually increasing the timeout, was it in nanosecond-level steps?
English
1
0
1
208
Maher Azzouzi
Maher Azzouzi@maherazz2·
@roddux Hello, yep i stumbled on the same off-by-one. Why this wasn't patched before btw? do you want to discuss it a bit?
English
1
0
1
209
roddux
roddux@roddux·
@maherazz2 I see your name on the mailing list message for this patch ;)
English
1
0
1
452
parrot409
parrot409@parrot409·
My ctf memory is getting weak?
English
1
0
1
577
parrot409
parrot409@parrot409·
I challenged myself to remember a library that isnt listed in this website but I failed.
English
2
0
7
954
Maher Azzouzi
Maher Azzouzi@maherazz2·
ZDI-CAN-27262 is a Linux kernel 0-day I reported recently that allows unprivileged users to escalate privileges to root. The vulnerability is a race condition leading to a UAF in the kmalloc-196 cache. It was introduced in v4.2-rc1 and has been present in the kernel for 10 years.
Maher Azzouzi tweet media
English
5
49
250
24.5K
Maher Azzouzi
Maher Azzouzi@maherazz2·
Android Binder use-after-free vulnerability reported to Google by me
Maher Azzouzi tweet media
English
4
8
176
18.8K
hakim
hakim@hakivvi·
Just finished my writeup about CVE-2025-23369, an interesting SAML authentication bypass on GitHub Enterprise Server I reported last year. you can read about it here: repzret.blogspot.com/2025/02/abusin…
English
9
92
453
41.1K
TrustSec
TrustSec@TrustSecAudits·
Finding bugs in the wild ft. Trust Security
TrustSec tweet media
English
14
1
161
8.3K
Joshua J. Drake
Joshua J. Drake@jduck·
@azz_maher I wrote one too a decade ago. It was a fun bug if even a bit mind blowing how complicated futex is...
English
1
0
1
125
Maher
Maher@azz_maher·
I wrote an LPE for CVE-2014-3153 AKA Towelroot, a bug in the Linux Kernel that was used to root Android devices earlier. The original exploit is closed source and protected against reverse engineering. PoC + mini write-up here: git.io/Jnazk
English
1
73
242
0