V4bel

42 posts

V4bel

V4bel

@v4bel

Independent Vuln. Researcher / Pwn2Own Berlin 2025 / Google kernelCTF 0-day / Pwnie Awards 2025

Katılım Kasım 2019
154 Takip Edilen1.3K Takipçiler
5unkn0wn
5unkn0wn@5unKn0wn·
This is my first Linux kernel exploit for Google kCTF, and the patch commit is now public: git.kernel.org/pub/scm/linux/… Actually, this bug was found by AI while analyzing 1-day variants, I'd like to share my approach for these AI things to find bug, and exploitation write-up later.
5unkn0wn tweet media
English
6
59
535
27.8K
V4bel
V4bel@v4bel·
Our CVE-2024-50264 with @_qwerty_po has won the Best Privilege Escalation category at the 2025 Pwnie Awards. Thank you, @PwnieAwards!!
V4bel tweet mediaV4bel tweet mediaV4bel tweet media
English
8
12
132
15K
V4bel
V4bel@v4bel·
I have now left @theori_io. After a brief break, I plan to resume my research 🤟
English
1
1
36
4.1K
V4bel
V4bel@v4bel·
@th31nitiate oh I phrased that confusingly. It’s not “a vuln discovered at Pwn2Own,” but “a vuln I found for Pwn2Own.”
English
0
0
1
542
Dr.Moon
Dr.Moon@th31nitiate·
@v4bel Why is it pwn2own that this discovery was made what makes it diffirent anyother time or place ?
English
1
0
7
557
V4bel
V4bel@v4bel·
CVE-2025-38087: Linux Kernel Traffic Control TAPRIO Use-After-Free This is a 64byte UAF write vuln I discovered for Pwn2Own. However, I couldn’t reliably exploit it due to the extremely narrow race window, so I had no choice but to patch it 😥 git.kernel.org/pub/scm/linux/…
English
2
18
107
8.9K
V4bel
V4bel@v4bel·
@_qwerty_po and I exploited a VSock 1-day in Google kernelCTF back in *February*, securing $71,337 🥳 (CVE-2025-21756, exp237/exp249) And I’ve just published the write-up: github.com/google/securit… A kernel developer reviewing a patch for a separate VSock bug I submitted accidentally discovered this vulnerability, and we were the first to exploit it. PoC 💻: root on Ubuntu 24.04
English
2
49
206
15K
V4bel
V4bel@v4bel·
@u1f383 Those two contexts are protected by ->current_entry_lock.
English
1
0
6
507
Pumpkin 🎃
Pumpkin 🎃@u1f383·
@ky1ebot May I kindly ask: if `rcu_replace_pointer()` is called during the time window when `switch_schedules()` switches from admin to oper and then resets admin to NULL, can the UAF still be triggered?
English
1
0
4
700
kylebot
kylebot@ky1ebot·
This is interesting. I exploited and reported this kernel bug at pwn2own in March last year and it got patched after more than half a year in Oct. And to this day, there is no mention that it is exploitable. Btw, the patch only reduces race window. github.com/torvalds/linux…
English
2
13
102
8.6K
V4bel retweetledi
TrendAI Zero Day Initiative
We have another collision. Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori were able to escalate to root on Red Hat Linux with an info leak and a UAF, but one of the bugs used was an N-day. They still win $15,000 and 1.5 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
14
74
13.6K
V4bel
V4bel@v4bel·
@pr0Ln Thank you! 😊
English
0
0
0
134
V4bel retweetledi
TrendAI Zero Day Initiative
Sweet! Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori were able to escalate to root on Red Hat Enterprise Linux. They head off to the disclosure room to cover the details of their exploit.
TrendAI Zero Day Initiative tweet media
English
0
15
114
11.8K
V4bel retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
Slides of my talk at #Zer0Con2025! ⚡️ Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits ⚡️ I presented the kernel-hack-drill open-source project and showed how it helped me to exploit CVE-2024-50264 in the Linux kernel. Enjoy! a13xp0p0v.github.io/img/Alexander_…
Alexander Popov tweet mediaAlexander Popov tweet mediaAlexander Popov tweet mediaAlexander Popov tweet media
English
3
103
346
27.9K