We’ll trace what really happens inside Telegram when you send or receive a message. 📨
Learn how to capture clean execution traces for Time Travel Analysis, step by step. Register here: https://eshard.eventbrite.fr/ 👈
Trusting your own judgement on 'AI' is a huge risk: https://www.baldurbjarnason.com/2025/trusting-your-own-judgement-on-ai/
39 years ago today....
https://nedbatchelder.com/blog/202506/digital_equipment_corporation_no_more.html
We wrote a blog post about a Linux kernel vulnerability we reported to Red Hat in July 2024. The vulnerability had been fixed upstream a year before, but Red Hat and derivatives distributions didn't backport the patch. It was assigned the CVE-2023-52922 after we reported it.
The vulnerability is a use-after-free read. We could abuse it to leak the encoded freelist pointer of an object. This allows an attacker to craft an encoded freelist pointer that decodes to an arbitrary address.
It also allows an attacker to leak the addresses of objects from the kernel heap, defeating physmap/heap address randomization.These primitives facilitate exploitation of the system by providing the attacker with useful primitives.
Additionally, we highlighted a typical pattern in the subsystem, as two similar vulnerabilities had been discovered. However, before publishing the blog post, we noticed that the patch for this vulnerability doesn't fix it. We could still trigger the use-after-free issue.
This finding confirms the point raised by the blog post. Furthermore, we discovered another vulnerability in the subsystem. An out-of-bounds read. We've reported them, and these two new vulnerabilities were already patched. A new blog post about them will be written.
Use-after-free vulnerability in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)
I don’t know who to credit for this, but it’s beautiful
A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects.
— Robert A. Heinlein
WinDBG vs esReverse: same concept (time travel debugging), very different scope.
We break down the differences in our blog: https://eshard.com/posts/difference-between-windbg-and-esreverse
The fact that these apps can launch local web servers to collude with tracking scripts and completely de-anonymize the users is wild. It's appalling. But here is what's not new:
Native apps from huge advertising companies (née "social" networks) are nothing but a slot machine where you pay with your data.
Get off these apps. Remove them now. Best yet, get off these addictive shit sites. And if you can't, visit them in at truly privacy preserving browser. 2/3.