Posts
3902
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
repeated

"I can see a bird in it from here," said Pooh. "Or is it a fish?"

0
1
0
repeated

A hands-on look at Microsoftโ€™s Independent Guest Virtual Machine (IGVM) format inside OpenHCLโ€™s `openhcl.bin`.

We unpack the fixed header, variable headers, data layout, and how IGVM measurement supports Confidential Computing with SEV-SNP and TDX.

๐Ÿ”— https://blog.quarkslab.com/the-igvm-file-format.html

0
2
0
repeated

Paramiko is a pure-Python implementation of SSHv2. Recently, we worked with the Paramiko team on a security audit sponsored by @ostifofficial ๐Ÿ™
Read a summary of our findings and find the full report here:
https://blog.quarkslab.com/paramiko-security-audit.html

0
2
0
[RSS] The IGVM [Independent Guest Virtual Machine] File Format

http://blog.quarkslab.com/the-igvm-file-format.html
0
0
1
repeated

While it's raining Linux LPEs, I suppose it's worth mentioning Copy Fail 2:Electric Boogaloo

Unlike CopyFail, this one works against Ubuntu 26.04, as it was only patched a few days ago

2
9
0
repeated

I am teaching an introduction to Linux binary exploitation class. We start with fundamentals, talking about micro/macro architecture, segmentation, paging, AMD64 changes/improvements, and so on.

In the class yesterday, we did a deep dive accompanied by the AMD manual about segmentation. It's easy to misinterpret many public texts that state "it's disabled/retired" when, in fact, just some features are ignored.

We still have the privilege level defined by segmentation (CS.CPL register); it's needed for 32-bit binaries running in CPU compatibility mode, and the GDT needs to be set up. Also, I showed the class how segmentation (CS.L) still controls the behavior of the processor as, depending on its value, instructions might behave differently. All of this was validated in real time on the VM through kernel debugging.

It seems like overkill to teach all those fundamentals just to learn about buffer overflows, format strings, and what could be done once arbitrary read/write is achieved in a modern Linux distribution, but I think it's valuable. I struggled in the past during binary and kernel exploitation, especially because I didn't understand much of those things well.

During the classes, I also learn important things. In my last Linux kernel exploitation class that took place a few years ago, my exploits stopped working. They exploit a race condition and were working fine, but I just happened to toggle the power mode from performance to power saver, and this interfered with the codes. Before that accident, I wasn't paying much attention to these details for several reasons. I then took the opportunity to read more about those technologies embedded in modern CPUs, and it has been rewarding.

I also learned some interesting things about glibc. As I have been playing with the kernel for most (or all?) of my professional career as a researcher, I didn't pay attention to lots of things. This week I just learned about dynamic and static TLS (Thread Local Storage). I had never imagined the scenario for dynamic TLS. Found some interesting things about it:

glibc: Major issue with Houdini
https://redhat.atlassian.net/browse/RHEL-39415%29

[PATCH] elf: Support recursive use of dynamic TLS in interposed malloc
https://inbox.sourceware.org/libc-alpha/8734p2h0t4.fsf@oldenburg.str.redhat.com/T/

A new TLS alloctor for glibc
https://youtu.be/JIkS4aLvQPg

A new TLS allocator for glibc
https://conf.gnu-tools-cauldron.org/media/opo25/submissions/LQTU3G/resources/tls_z0ToUZm.pdf

0
5
0
[RSS] Make it Blink: Over-the-Air Exploitation of the Philips Hue Bridge

https://www.synacktiv.com/en/publications/make-it-blink-over-the-air-exploitation-of-the-philips-hue-bridge
0
1
1
[RSS] Bleeding Llama: Critical Unauthenticated Memory Leak in Ollama (CVE-2026-7482)

https://www.cyera.com/research/bleeding-llama-critical-unauthenticated-memory-leak-in-ollama
0
0
2
repeated

Non-technical teams are now shipping production vulns

2
10
0
repeated

Jerry ๐Ÿฆ™๐Ÿ’๐Ÿฆ™

Honestly, one of the things I like least about traveling for work is having to wear pants. Seems like we should have moved past this expectation by now

15
5
1
repeated

They'd have got away with it, if it wasn't for those meddling kids.

1
5
0
repeated
repeated
Edited 2 days ago

"That 'responsible disclosure' Thing"

A post with the details of CVE-2026-23918, the double free vulnerability fixed in Apache httpd 2.4.67.


https://eissing.org/icing/posts/responsible-disclosure/

4
6
0
repeated

@daveaitel @sherrod_im The willful ignorance of latent vulns. It was as if it didnโ€™t exist until a vuln researcher discovered it.

0
4
0
@gsuberland

Remember me to one who lived there.
She once was a true love of mine.
0
0
2
repeated

Oh cool, Ollama on Windows has unpatched vulnerabilities that lead to Ollama downloading unverified updates from a malicious URL if set locally, and also path traversal that leads to arbitrary file write.

Disclosure without patch.

https://www.striga.ai/research/ollama-windows-auto-update-rce

0
4
0
repeated

bert hubert ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ฆ

Edited 2 days ago

The world is now so full of ridiculous things that at least I struggle to deal with it all. But this is not an 'us' problem. The (political) world really is idiotic. I needed to vent a bit, so I made a list of things that are impossible to believe, yet are very much what is happening. Perhaps seeing it in writing will help you deal better with the situation. https://berthub.eu/articles/posts/the-impossible-things-we-have-to-believe/

4
6
0
repeated

This. ๐Ÿ‘‡

3
7
0
Show older