QEMU 9.2 open-source machine emulator introduces advanced ARM support, Nitro Enclave emulation, Vulkan-enhanced graphics, and more.
https://linuxiac.com/qemu-9-2-open-source-machine-emulator/
The new #curl CVE-2024-11053 we call "netrc and redirect credential leak"
While security low, it will of course still be relevant to whomever uses the unlucky combination of options.
Back when I was poking around with filesystem fuzzing stuff years back, I noticed something odd:
An EXT filesystem can tell the Linux OS how it should behave "if" the filesystem is corrupt, including triggering a kernel panic. In a world where USB thumb drives exist, this seems... not ideal.
Let's see what happens if we plug such a mass storage device into a fully patched Chromebook in 2024...
Oh.
"iDecompile: Writing a Decompiler for iOS Applications"(Laurie Kirk)
Things I learned:
When decompiling iOS apps it makes sense to think of the application life cycle, i.e. specific code is triggered when apps go from background to foreground. You can think of these triggers as multiple mains or entry points.
Tool for #reverseengineering
https://github.com/LaurieWired/Malimite
LIEF 0.16.0 is out featuring new (extended) capabilities like Dyld Shared Cache support, Assembler/disassembler, ...
It's the last Patch Tuesday of 2024, but that doesn't mean #Adobe or #Microsoft took it easy. There's one Microsoft CVE being actively exploited and Adobe released fixes for 167 CVEs(!) in total. Join @TheDustinChilds as he breaks down the release. https://www.zerodayinitiative.com/blog/2024/12/10/the-december-2024-security-update-review
Happy #PatchTuesday from Splunk:
No verbiage of exploitation.
CLFS seems like the gift that keeps on giving.
CVE-2024-49138 is being exploited ITW, apparently.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138
Given that it says that it's publicly disclosed, does anybody know offhand where CVE-2024-49138 is discussed publicly?
Happy #PatchTuesday from Microsoft: 71 new vulnerabilities, ONE ZERO-DAY:
Update for CVE-2024-38033 (7.3 high, from 09 July 2024) PowerShell Elevation of Privilege Vulnerability was reissued a patch for all affected versions of Windows Server 2012 and Windows Server 2012 R2.
The Microsoft data arrived almost 10 minutes early.
cc: @goatyell @mttaggart @hrbrmstr @ntkramer @iagox86 @zackwhittaker @dreadpir8robots @TheDustinChilds @neurovagrant @xorhex @campuscodi @briankrebs (remember to remove the mentions to avoid ReplyAll madness)
#microsoft #msrc #vulnerability #cve #infosec #cybersecurity