Posts
2513
Following
655
Followers
1474
"I'm interested in all kinds of astronomy."
repeated

Hello and welcome to this installment of ! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.

A very short thread.

SiPron page: https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4

3
2
0
repeated
repeated

I nominate https://docs.openssl.org/3.3/man3/d2i_X509/ as 's worst man page. And there's fierce competition for that award.

And in the end it does not even mention the weird behavior: it stores errors in an internal queue which mysteriously makes the *next* invoked function fail...

4
2
0
repeated

I found a Linux kernel security bug (in AF_UNIX) and decided to write a kernel exploit for it that can go straight from "attacker can run arbitrary native code in a seccomp-sandboxed Chrome renderer" to kernel compromise:
https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html

This post includes fun things like:

  • a nice semi-arbitrary read primitive combined with an annoying write primitive
  • slowing down usercopy without FUSE or userfaultfd
  • CONFIG_RANDOMIZE_KSTACK_OFFSET as an exploitation aid
  • a rarely-used kernel feature that Chrome doesn't need but is reachable in the Chrome sandbox
  • sched_getcpu() usable inside Chrome renderers despite getcpu being blocked by seccomp (thanks to vDSO)
1
17
0
Edited 5 days ago
[RSS] CVE-2024-12718: Path Escape via Python's tarfile Extraction Filters

https://www.upwind.io/feed/cve-2024-12718-path-escape-via-pythons-tarfile-extraction-filters
0
0
2
[RSS] Oops Safari, I think You Spilled Something!

CVE-2024-44308 writeup by Exodus Intelligence

https://blog.exodusintel.com/2025/08/04/oops-safari-i-think-you-spilled-something/
0
0
1
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

PDF-XChange Editor EMF File EMR_EXTCREATEFONTINDIRECTW Facename Out-Of-Bounds Read Vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2203

CVE-2025-47152
0
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

PDF-XChange Editor EMF File EMR_POLYDRAW16 PT_BEZIERTO Out-Of-Bounds Read Vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2171

CVE-2025-27931
0
1
0
repeated

Project Zero Bot

New Project Zero issue:

Linux >=6.9: broken AF_UNIX MSG_OOB handling causes UAF read+write

https://project-zero.issues.chromium.org/issues/423023990

CVE-2025-38236
0
8
8
repeated

WANTED: Intel Architecture Labs 1990’s CD-ROM’s. They appear to have maybe been monthly. They contained a mirror of Intel’s ‘download.intel.com’ ftp server, specifically the /ial/ subdirectory which is not in the 2014 backup of the site on archive.org.

Lots and lots of white papers and design guideline documents in there. Especially looking for ones from the late 1990’s (1998-ish onward) if they exist. I’ve seen references in mailing lists to them that lead me to believe they do.
Example gem: intel trying to cover its ass after the FDIV bug, and have some more FDIV

5
19
0
repeated
Edited 6 days ago

I need help car jacking my own car. Left the keys inside :(

Can someone help me with that? Either with lockpicking tools or those inflatable cushions?
Its an old car, no fancy stuff.

Please do your magic.

Edit: ANWB fixed it.

4
4
0
repeated

1/ The most powerful hacker in the world right now is femboy·cat who is able to control 5% of Internet hosts, making them the all-time champion of the IPv4 Games.

3
5
0
repeated
Edited 2 days ago

Happy new Rust! 🎆🦀

Rust 1.89.0 has been released!

This release brings you inferred args to const generics (e.g. array length: `[false; _]`), the new mismatched_lifetime_syntaxes lint, u128/i128 in extern "C", NonZero<char>, File::{lock,unlock,etc.}, many x86 intrinsics, and much more! ✨

Check out the blog post and release notes for all the details: https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/

0
7
1
repeated

Nspace @ WHY2025 (☎️ 4141)

Our newest blog post about exploiting Retbleed, a bug in AMD CPUs, in the real world is out! Enjoy!
https://bughunters.google.com/blog/6243730100977664/exploiting-retbleed-in-the-real-world

0
7
0
repeated

Support MDN, support the web 🧡

The MDN swag is live! Now you can rep your favorite dev resource with t-shirts, hoodies, mugs, and more, shipped straight to your door 🏠

🇺🇸 US → https://mozilla-na.myspreadshop.com/
🇪🇺 EU/UK → https://mozilla-europe.myspreadshop.ie/

(And yes, ships internationally too!)

0
2
0
repeated

One byte memory overwrite = total system compromise.

Rocky Linux Hardened (RLC-H) stops this with hardened_malloc.

Read Jeremy Allison’s blog: https://hubs.li/Q03Bs1V70

Thanks @grapheneos & Rocky Security SIG!

1
2
0
repeated

Using a function to give a user profile the ability to see every object on the system, even ones I not authorized to.
💙
https://www.rpgpgm.com/2025/08/giving-ability-to-see-all-of-objects-on.html

0
1
0
repeated
Edited 6 days ago

Are you located in the US/EU? Passionate about ? Maybe you follow or are an avid player and are ready to take the next step. If so, we're looking for our next , so consider applying today - https://hackers.doyensec.com.

0
2
0
Show older