New on blog: "The perils of transition to 64-bit #time_t"
"""
In the "Overview of cross-architecture portability problems", I have dedicated a section to the problems resulting from use of #32-bit `time_t` type. This design decision, still affecting Gentoo systems using glibc, means that 32-bit applications will suddenly start failing in horrible ways in 2038: they will be getting `-1` error instead of the current time, they won't be able to `stat()` files. In one word: complete mayhem will emerge.
There is a general agreement that the way forward is to change `time_t` to a 64-bit type. Musl has already switched to that, glibc supports it as an option. A number of other distributions such as Debian have taken the leap and switched. Unfortunately, source-based distributions such as #Gentoo don't have it that easy. So we are still debating the issue and experimenting, trying to figure out a maximally safe upgrade path for our users.
Unfortunately, that's nowhere near trivial. Above all, we are talking about a breaking ABI change. It's all-or-nothing. If a library uses `time_t` in its API, everything linking to it needs to use the same type width. In this post, I'd like to explore the issue in detail — why is it so bad, and what we can do to make it safer.
"""
https://blogs.gentoo.org/mgorny/2024/09/28/the-perils-of-transition-to-64-bit-time_t/
Them: “This is not a paywall.”
Me: “whew”
Them: Provide your Email address”
Me: “that’s a payment, though. Personal information is a payment”
Analog filters, part II: let it ring
https://lcamtuf.substack.com/p/analog-filters-part-2-let-it-ring/?1
I’m happy to see that the GOV.UK Service Manual’s “Building a robust frontend using progressive enhancement” page was updated this week and made it to the top of Hacker News today. The technology industry would collectively save unimaginable quantities of time, money, energy and stress if this single page were required reading for everyone involved in building a web site. https://www.gov.uk/service-manual/technology/using-progressive-enhancement
"Sometimes, hacking is just someone spending more time on something than anyone else might reasonably expect.”
— Jerry Gamblin
40th Weekly Vuln Research newsletter is OUT NOW 📰
iOS kernel exploitation from @alfiecg_dev
Elgato hacking from @dt_db
@_tsuro bypasses CET
RCU Internals from @u1f383
Google Teams check off their OKRs
➕ Jobs and more 👇
We had a short look at the buffer overflow found by fuzzing `process_browse_data` to determine its exploitability. Conclusion: this bug alone won't give you RCE, or even an info leak.
Here's my quick and dirty PoC for the CUPS vulns. I wrote it after spotting the patches in the public CUPS repo. As always, expect CTF-quality code :D
Finally I got myself to write a script to generate documentation for #Ghidra - now I host the latest info about 11.2, including but not limited to:
I took this opportunity to redo the directory structure that broke most search engine links, sorry about that (this will improve with time ofc)!
Normal authors: release book to the public early in the week, with much fanfare.
Me, late Friday afternoon, from a dark alley: "psst! Hey, you! Yeah, you! #sysadmin! Buddy! You ever wanted to Run Your Own Mail Server?" #ryoms
https://www.tiltedwindmillpress.com/product/ryoms-ebook/
(boosts appreciated!
)