Posts
2520
Following
647
Followers
1461
"I'm interested in all kinds of astronomy."
repeated

mgorny-nyan (he) autism🙀🚂🐧

New on blog: "The perils of transition to 64-bit "

"""
In the "Overview of cross-architecture portability problems", I have dedicated a section to the problems resulting from use of #32-bit `time_t` type. This design decision, still affecting Gentoo systems using glibc, means that 32-bit applications will suddenly start failing in horrible ways in 2038: they will be getting `-1` error instead of the current time, they won't be able to `stat()` files. In one word: complete mayhem will emerge.

There is a general agreement that the way forward is to change `time_t` to a 64-bit type. Musl has already switched to that, glibc supports it as an option. A number of other distributions such as Debian have taken the leap and switched. Unfortunately, source-based distributions such as don't have it that easy. So we are still debating the issue and experimenting, trying to figure out a maximally safe upgrade path for our users.

Unfortunately, that's nowhere near trivial. Above all, we are talking about a breaking ABI change. It's all-or-nothing. If a library uses `time_t` in its API, everything linking to it needs to use the same type width. In this post, I'd like to explore the issue in detail — why is it so bad, and what we can do to make it safer.
"""

https://blogs.gentoo.org/mgorny/2024/09/28/the-perils-of-transition-to-64-bit-time_t/

3
4
0
repeated

Them: “This is not a paywall.”
Me: “whew”

Them: Provide your Email address”

Me: “that’s a payment, though. Personal information is a payment”

2
11
0
repeated
[RSS] Reverse-engineering a three-axis attitude indicator from the F-4 fighter plane

http://www.righto.com/2024/09/f4-attitude-indicator.html?m=1
0
0
0
I just realized that the "DoD Cyber Crime Center" on GitHub is not just a parody reference to NSA o.O
0
0
1

If you feel like joining the “fun”, here’s the javadoc for #Ghidra Version Tracking:

https://scrapco.de/ghidra_docs/Features/VersionTracking/javadoc/

(I had to update my script again to include this - digging up docs for NSA sw really has some Quest for Knowledge vibes
)

0
1
1
repeated

@wendynather and 2 slides into "how to fix it", I've quoted you

Again, really hoping they record your talk, so I have some new quotes from when I update these slides 😅

1
2
0
1 file changed, 99 insertions
but it ain't fucking work
0
0
1
Anyone has an idea what I should do with this exception:

ghidra.framework.store.LockException: domain object(s) are busy/locked

I solved like a dozen #Ghidra API mysteries today, but I'm running out of ideas with this one...
1
2
2
repeated

I’m happy to see that the GOV.UK Service Manual’s “Building a robust frontend using progressive enhancement” page was updated this week and made it to the top of Hacker News today. The technology industry would collectively save unimaginable quantities of time, money, energy and stress if this single page were required reading for everyone involved in building a web site. https://www.gov.uk/service-manual/technology/using-progressive-enhancement

1
7
0
repeated
@bouncepaw Let us know how it goes! Last time I checked shaving is a massive PIT...F? without all this disposable crap :(
0
0
2

@jeffvanderstoep Thanks for your reply! I don’t doubt the validity of your measurement. I’d argue about two things:

  • The simpler thing is communication: the phrase “half-life” or “decay” implies that vulns disappear without explicit dev intervention, e.g. as a side-effect of unrelated code changes (or even the passage of time!). While this may be true in some cases I don’t see how the data would (or could) support such an observation.
  • My understanding is that when we look at overall results of different vuln discovery strategies (your study) or applying the same strategy with “more force” (Böhme-Falk) we basically see the effects of testing coverage, and it’s no surprise we can grow coverage faster in new code. What I think would be more revealing is looking at new vulns(/LoC?) vs code age when a new discovery method (e.g. a new sanitizer or more intelligent test-case generation ) is introduced. FTR: I bet such data would actually confirm your results, but without data about the effect of new discovery methods I think drawing conclusions about code “maturity” is much harder.
0
0
0
repeated

"Sometimes, hacking is just someone spending more time on something than anyone else might reasonably expect.”

— Jerry Gamblin

0
7
0
#wfh #rto #commute
Show content
"Quite a lot of people enjoy their commute time. And there’s good behavioral evidence for this because economists have noticed that people live a bit further from work than they optimally should in order to create a chronological buffer between where they work and where they live. We like that decompression time."[1]

While I don't agree with the conclusion of the article (optimizing commute), this pretty much confirms my experience.

I like to stare at my nothing box.[2]

[1] https://behavioralscientist.org/are-we-too-impatient-to-be-intelligent/
[2] https://www.youtube.com/watch?v=SZ6mVumHY9I
0
0
0
@Caution For the noble cause: "baszd meg magad"/"baszĂłdj meg" - the latter is a passive form without the "self-reference" but I think it's more common #Hungarian
0
0
3
repeated

40th Weekly Vuln Research newsletter is OUT NOW 📰

iOS kernel exploitation from @alfiecg_dev

Elgato hacking from @dt_db

@_tsuro bypasses CET

RCU Internals from @u1f383

Google Teams check off their OKRs

➕ Jobs and more 👇

https://blog.exploits.club/exploits-club-weekly-newsletter-40-ios-kernel-exploitation-cet-bypasses-elgato-hardware-repair-and-more/

0
3
0
repeated
New assessment for topic: CVE-2023-25950

Topic description: "HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request ..."

"HAProxy's HTTP/3 implementation fails to block a **malformed HTTP header field name**, and **when deployed in front of a server that incorrectly process this malformed header**, it may be used to conduct an HTTP request/response smuggling attack ..."

Link: https://attackerkb.com/assessments/410b285d-5724-4300-bcc4-603cc4c726ac
0
1
0
@kaoudis better not mess with porridge demons either!
0
0
1
Show older