Posts
3368
Following
712
Followers
1580
"I'm interested in all kinds of astronomy."
repeated

We wrote a blog post about a Linux kernel vulnerability we reported to Red Hat in July 2024. The vulnerability had been fixed upstream a year before, but Red Hat and derivatives distributions didn't backport the patch. It was assigned the CVE-2023-52922 after we reported it.

The vulnerability is a use-after-free read. We could abuse it to leak the encoded freelist pointer of an object. This allows an attacker to craft an encoded freelist pointer that decodes to an arbitrary address.

It also allows an attacker to leak the addresses of objects from the kernel heap, defeating physmap/heap address randomization.These primitives facilitate exploitation of the system by providing the attacker with useful primitives.

Additionally, we highlighted a typical pattern in the subsystem, as two similar vulnerabilities had been discovered. However, before publishing the blog post, we noticed that the patch for this vulnerability doesn't fix it. We could still trigger the use-after-free issue.

This finding confirms the point raised by the blog post. Furthermore, we discovered another vulnerability in the subsystem. An out-of-bounds read. We've reported them, and these two new vulnerabilities were already patched. A new blog post about them will be written.

Use-after-free vulnerability in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)

https://allelesecurity.com/use-after-free-vulnerability-in-can-bcm-subsystem-leading-to-information-disclosure-cve-2023-52922/

1
4
0
repeated

I don’t know who to credit for this, but it’s beautiful

5
10
0
repeated

A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects.

— Robert A. Heinlein

0
3
0
repeated

WinDBG vs esReverse: same concept (time travel debugging), very different scope.

We break down the differences in our blog: https://eshard.com/posts/difference-between-windbg-and-esreverse

0
2
0
repeated

The fact that these apps can launch local web servers to collude with tracking scripts and completely de-anonymize the users is wild. It's appalling. But here is what's not new:

Native apps from huge advertising companies (née "social" networks) are nothing but a slot machine where you pay with your data.

Get off these apps. Remove them now. Best yet, get off these addictive shit sites. And if you can't, visit them in at truly privacy preserving browser. 2/3.

1
2
0
[RSS] Discovering a JDK Race Condition, and Debugging it in 30 Minutes with Fray

https://aoli.al/blogs/jdk-bug/
0
1
3
repeated
repeated
How Compiler Explorer Works in 2025 — Matt Godbolt’s blog
https://xania.org/202506/how-compiler-explorer-works

#fromBsky
0
3
4
repeated

Zen quote of the day.

5
16
2
repeated

When you go to the lavatory, spend a longer time there than is necessary.

0
3
0
@zhuowei I made this, you can check how it works on my accounts : https://github.com/v-p-b/rss2bsky.py
0
0
1
repeated

⚠️ woman reportedly found having fun

7
2
0
@maldr0id @oberstenzian During last 10-15 years of communist Hungary there were some sanctioned comedians who could tell all the jokes about the system, allowing the people to get off some steam. The system still collapsed, and no one thinks of the comedians negatively. At that period the problem was not free speech as everyone knew things were shit (in part b/c of jokes that couldn't be controlled anyway) Problem was if you resisted, you could get shot.
0
0
2
@maldr0id not exactly about police but this one is great(not sure how it'll translate though)

Pravda has a story about Stalin visiting the fields at the countryside:
- How are we doing, how are we doing? - asked Comrade Stalin, jokingly
- We're fine, we're fine - replied the workers, jokingly
0
0
5
repeated

Communist Poland was exceptionally good at making fun of secret police and egomaniacal leaders.

If my American friends need some good authoritarian jokes so that they can keep their spirits up for the long run I can suggest some!

6
8
0
repeated

In case anyone here has connections with the Python team: can you please tell them to update their docs on XML security? The way it is is quite misleading, and it's been annoying me for a while. I raised this a while ago in their issue tracker, but it got no reaction whatsoever. https://github.com/python/cpython/issues/127502 🧵

1
1
0
repeated

Computer History Museum 🇸🇮

PHP just turned 30! 🎉 Did you create guestbooks for your website like the early users of the language? 📜 Do you remember technologies like PHP-Nuke, phpBB, or browsing vBulletin forums? 💻

1
3
0
repeated

The slides for @offensive_con talk "Hunting for overlooked cookies in Windows 11 KTM and baking exploits for them" by @saidelike and I are here:

https://docs.google.com/presentation/d/1M_ziQt6rZA01ghsv0qo7lhqyOLIZYNnV-qjHWun6A1g/edit?usp=sharing

1
3
0
repeated

another day, another binary file format with a badly designed magic number

not gonna call it out specifically but here are some RFC2113 MUSTs for magic number design:

MUST be the very first N bytes in the file
MUST be at least four bytes long, eight is better
MUST include at least one byte with the high bit set
MUST include a byte sequence that is invalid UTF-8
SHOULD include a zero byte, but you can usually get away with having that be part of the overall version number that immediately follows the magic number (did I mention that you really SHOULD put an overall version number right after the magic number, unless you know and have documented exactly why it's not necessary, e.g. PNG?)

good examples:

  • PNG
  • ELF

bad examples:

  • GIF
  • PE
  • PDF
5
7
0
Show older