Hello and welcome to this installment of #nakeddiefriday! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.
A very short thread.
SiPron page: https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4
Project: mpengine-x64-pdb 1.1.24090.11
File: mpengine.dll
Address: 75a29a8e4
sqlite3WhereCodeOneLoopStart
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a29a8e4.json&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a29a8e4.json&colors=light
I nominate https://docs.openssl.org/3.3/man3/d2i_X509/ as #OpenSSL's worst man page. And there's fierce competition for that award.
And in the end it does not even mention the weird behavior: it stores errors in an internal queue which mysteriously makes the *next* invoked function fail...
I found a Linux kernel security bug (in AF_UNIX) and decided to write a kernel exploit for it that can go straight from "attacker can run arbitrary native code in a seccomp-sandboxed Chrome renderer" to kernel compromise:
https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html
This post includes fun things like:
CONFIG_RANDOMIZE_KSTACK_OFFSET
as an exploitation aidsched_getcpu()
usable inside Chrome renderers despite getcpu
being blocked by seccomp (thanks to vDSO)WANTED: Intel Architecture Labs 1990’s CD-ROM’s. They appear to have maybe been monthly. They contained a mirror of Intel’s ‘download.intel.com’ ftp server, specifically the /ial/ subdirectory which is not in the 2014 backup of the site on archive.org.
Lots and lots of white papers and design guideline documents in there. Especially looking for ones from the late 1990’s (1998-ish onward) if they exist. I’ve seen references in mailing lists to them that lead me to believe they do.
Example gem: intel trying to cover its ass after the FDIV bug, and have some more FDIV
I need help car jacking my own car. Left the keys inside :(
Can someone help me with that? Either with lockpicking tools or those inflatable cushions?
Its an old car, no fancy stuff.
Please #why2025 do your magic.
Edit: ANWB fixed it.
1/ The most powerful hacker in the world right now is femboy·cat who is able to control 5% of Internet hosts, making them the all-time champion of the IPv4 Games.
Happy new Rust! 🎆🦀
Rust 1.89.0 has been released!
This release brings you inferred args to const generics (e.g. array length: `[false; _]`), the new mismatched_lifetime_syntaxes lint, u128/i128 in extern "C", NonZero<char>, File::{lock,unlock,etc.}, many x86 intrinsics, and much more! ✨
Check out the blog post and release notes for all the details: https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/
Our newest blog post about exploiting Retbleed, a bug in AMD CPUs, in the real world is out! Enjoy!
https://bughunters.google.com/blog/6243730100977664/exploiting-retbleed-in-the-real-world
Support MDN, support the web 🧡
The MDN swag is live! Now you can rep your favorite dev resource with t-shirts, hoodies, mugs, and more, shipped straight to your door 🏠
🇺🇸 US → https://mozilla-na.myspreadshop.com/
🇪🇺 EU/UK → https://mozilla-europe.myspreadshop.ie/
(And yes, ships internationally too!)
One byte memory overwrite = total system compromise.
Rocky Linux Hardened (RLC-H) stops this with hardened_malloc.
Read Jeremy Allison’s blog: https://hubs.li/Q03Bs1V70
Thanks @grapheneos & Rocky Security SIG!
Using a function to give a user profile the ability to see every object on the system, even ones I not authorized to.
💙 #IBMi #rpgpgm #IBMChampion
https://www.rpgpgm.com/2025/08/giving-ability-to-see-all-of-objects-on.html
Are you located in the US/EU? Passionate about #appsec? Maybe you follow #bugbountytips or are an avid #ctf player and are ready to take the next step. If so, we're looking for our next #intern, so consider applying today - https://hackers.doyensec.com.
#doyensec #security #internship #bugbounty