Man Yue Mo Profile
Man Yue Mo

@mmolgtm

Followers
5K
Following
2
Media
1
Statuses
59

Security researcher at GitHub Security Lab. Tweets/views/opinions are my own.

Joined September 2017
Don't wanna be here? Send us removal request.
@mmolgtm
Man Yue Mo
1 year
In this post I'll use CVE-2024-5830, a bug in object transitions in Chrome to gain RCE in the Chrome renderer sandbox:
Tweet card summary image
github.blog
In this post, I'll exploit CVE-2024-5830, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.
2
78
267
@mmolgtm
Man Yue Mo
1 year
RT @oegerikus: I founded a new company: @xbow. XBOW brings AI to offensive security, augmenting the productivity of pentesters, bug hunters….
0
16
0
@grok
Grok
6 days
Join millions who have switched to Grok.
250
500
4K
@mmolgtm
Man Yue Mo
1 year
In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled.
Tweet card summary image
github.blog
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this...
8
147
414
@mmolgtm
Man Yue Mo
2 years
In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gain RCE in the Chrome renderer sandbox:
5
102
313
@mmolgtm
Man Yue Mo
2 years
In this post I'll use CVE-2023-3420, an incorrect side effect modelling bug in the JIT compiler that I reported to Chrome, to gain a sandboxed remote code execution in the renderer:
Tweet card summary image
github.blog
In this post, I'll exploit CVE-2023-3420, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.
4
109
297
@mmolgtm
Man Yue Mo
2 years
This time I'll look at CVE-2022-46395, an Arm Mali GPU driver UAF I found by analysing Jann Horn's CVE-2022-36449. I'll also use a technique of Jann Horn to win a very tight race to gain arbitrary kernel code execution and root from untrusted Android app.
Tweet card summary image
github.blog
In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain...
8
87
244
@mmolgtm
Man Yue Mo
2 years
In this post I'll look at a patching issue that leaves Pixel 6 vulnerable to an already fixed bug for more than 5 months. This allows arbitrary kernel code execution and root from an untrusted app and shows some potential problems with backporting:
Tweet card summary image
github.blog
In this post, I’ll look at a security-related change in version r40p0 of the Arm Mali driver that was AWOL in the January update of the Pixel bulletin, where other patches from r40p0 was applied, and...
0
45
136
@mmolgtm
Man Yue Mo
3 years
CVE-2022-25664 is one of the most interesting bug I've reported. It's "only" an info leak, but a very powerful one that allows an untrusted Android app to read pages of memory from the kernel or other apps any number of times.
Tweet card summary image
github.blog
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to...
0
108
347
@mmolgtm
Man Yue Mo
3 years
It may seem fair that Android "can't fix" this bug as it's in 3rd party code, but even after Arm released a public patch, it look 3 months for Android to apply the patch. Sadly, this is not a one off, as the list goes on: IMO this is worse than having 0day.
Tweet card summary image
github.blog
It turns out that the first “all Google” phone includes a non-Google bug. Learn about the details of CVE-2022-38181, a vulnerability in the Arm Mali GPU. Join me on my journey through reporting the...
1
15
37
@mmolgtm
Man Yue Mo
3 years
In this post I'll use CVE-2022-38181, a use-after-free I reported last year in the Arm Mali GPU driver to gain arbitrary kernel code execution and root from untrusted Android app. Not sure if the bug or the disclosure is more interesting:
Tweet card summary image
github.blog
It turns out that the first “all Google” phone includes a non-Google bug. Learn about the details of CVE-2022-38181, a vulnerability in the Arm Mali GPU. Join me on my journey through reporting the...
3
134
375
@mmolgtm
Man Yue Mo
3 years
file: "mali_app/app/src/main/cpp/hello-jni.c": 4b66a16931b96fdf14a32aa9963c25326a2a8b217e7a842d886d5885ef01956d .The email I sent: 234646839712e54fb7179ab74ddeb6bb8857d9bd853b29be2596fdb21d22a4c7 (Plain text starts from "Hi" and ends with "Mo") Thanks!.
0
0
3
@mmolgtm
Man Yue Mo
3 years
Bug trigger: 1. file with "main", shorter file name: b50887cdcd53c2d63ea8253bae534aa079f99aac93fa5ff900c34f9475cb4086 .2. file with "main", longer file name: c20576e4895e6d4ddd1b40eb05375d274b2788867d0aa921699b9dddd945732a.
1
1
3
@mmolgtm
Man Yue Mo
3 years
If someone from @Arm security is reading this, please reply to my email on 5 Aug about a bug report that Android security team shared with you privately, thanks. SHA256 of various files for verification (next tweets).
3
12
23
@mmolgtm
Man Yue Mo
3 years
This might be the best bug I found. Never thought I'd be writing a kernel exploit as reliable, clean and fast as a browser exploit. For a while I actually used this to root my research phone when can't be bothered to patch the rom:
Tweet card summary image
github.blog
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me...
7
125
425
@mmolgtm
Man Yue Mo
3 years
This is probably the most complex exploit I've done so far. A UAF in Android kernel freed by kfree_rcu (introduces a delay) in a tight race + kCFI + Samsung RKP. Yet its still possible to gain arbitrary kernel RW, disable SE and root from untrusted app.
Tweet card summary image
github.blog
In this post I’ll exploit CVE-2022-22057, a use-after-free in the Qualcomm gpu kernel driver, to gain root and disable SELinux from the untrusted app sandbox on a Samsung Z flip 3. I’ll look at...
4
163
506
@mmolgtm
Man Yue Mo
4 years
In this post I'll go through 3 bugs in the Qualcomm NPU driver that I reported, which allowed me to execute arbitrary kernel code from the untrusted app domain in Android, disable SELinux and bypass task cred protection to gain root on a Samsung phone:
4
96
304
@mmolgtm
Man Yue Mo
4 years
RT @GHSecurityLab: Go dumpster diving for arbitrary code execution in v8's garbage collector with @mmolgtm in his Chrome vulnerability RCA….
0
94
0
@mmolgtm
Man Yue Mo
4 years
RT @GHSecurityLab: Learn how @mmolgtm dug his way out of the Chrome sandbox using a credit card as a shovel! "The fugitive in Java: Escapin….
0
35
0