|
You are here |
github.blog | ||
| | | | |
blog.quarkslab.com
|
|
| | | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | | |
securitylab.github.com
|
|
| | | | | Improper validation of input data can lead to freed memory being accessible from the GPU, which can lead to arbitrary memory access. | |
| | | | |
docfate111.github.io
|
|
| | | | | [AI summary] A detailed explanation of a Linux kernel vulnerability (CVE-2021-42327) in the GPU driver, involving a SLUB buffer overflow that allows privilege escalation and arbitrary code execution through exploitation techniques like heap spraying and KASLR bypass. | |
| | | | |
openssf.org
|
|
| | | [AI summary] The Alpha-Omega grant aims to enhance Homebrew's security by implementing Sigstore attestations and SLSA Build Level 2 to ensure secure software supply chains. | ||