harrysintonen

joined 2 years ago
 

Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:

#cve_2025_32463 #cve_2025_32462 #infosec #cybersecurity

 

Insecure defaults can lead to surprises. When creating FIFO sockets with systemd, be sure to note that SocketMode defaults to 0666 - that is world readable and writable. That is: any local user can communicate with the FIFO. If your FIFO is used to perform privileged operations you must ensure that either the FIFO file itself is located in secured location or set SocketMode to stricter value.

I spotted one such insecure use in cloud-init: the hotplug FIFO was world writable. This is CVE-2024-11584 and fixed in cloud-init 25.1.3.

The commit fixing this is in https://github.com/canonical/cloud-init/pull/6265

#CVE_2024_11584 #ubuntu #systemd #infosec #cybersecurity

 

The timeline in the "SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem" advisory is mind blowing:

https://seclists.org/fulldisclosure/2025/Jun/17

#CVE_2025_26412 #infosec #cybersecurity #vulnerability

[–] [email protected] 1 points 1 month ago

Here's the more constructive part of the (I still think warranted - but likely a bit tone deaf) rant: https://github.com/tukaani-project/xz/pull/181

 

Deliberately not calling API functions that you're supposed to.

To gain speed at application exit.

I'm just dumbfounded by this. What the actual frick?

https://github.com/tukaani-project/xz/blob/dbfb925c8198087afb3527e6c57b66fae1a980bb/src/xz/main.c#L342

https://github.com/tukaani-project/xz/blob/dbfb925c8198087afb3527e6c57b66fae1a980bb/src/xzdec/xzdec.c#L482

This all is fine and dandy if your library is guaranteed to link to libc malloc that gets released at app exit. But this is assuming quite a bit about how shared libraries work. Not every platform has linkage like this in both ways. Ours doesn't and as a result XZ utilities leak memory on every invocation. It would be fine if the API would be used correctly, but the XZ utilities themselves opt out from calling the lzma_end() function "to be faster" at application exit. You'd think the authors would realize that this is not very speed critical, esp since you've just spent millions cycles more compressing or decompressing.

#dailywtf #development #programming

 

If you're creating an application that displays URLs to users (chat app for example), please make sure to apply spoof checks to avoid use of UTF-8 confusables in IDN homograph attacks. You may want to block URLs with hostnames that get flagged, or display them in #punycode instead.

As an example, see https://github.com/chromium/chromium/tree/main/components/url_formatter/spoof_checks

In particular https://github.com/chromium/chromium/blob/8e070073d47861b8bfc7548dce8fcfc708a356fb/components/url_formatter/spoof_checks/idn_spoof_checker.cc#L177 is quite interesting read.

#cybersecurity #infosec

[–] [email protected] 1 points 1 month ago (1 children)

@[email protected] I had the following enabled for me:

  • Targeting in external channels
  • Analytics and customer grouping

I had specifically disabled "Item-level purchase data" before, and I'm fairly confident I did not explicitly enable those other two.

 

S-Group (one of the big two retail chains in Finland) enables AI model training from user data by default. S-Group claims that "Data protection is built in, and even for training the model, data from customers who have opted out of analytics is not used."

S-Group has millions of customers, for whom they've now enabled this by default. If data protection were built-in, they would rather make this something people need to specifically opt-in to.

If you're an S-Group client (for example, you have an S-card), you can disallow your information from being used by visiting: https://s-kayttajatili.fi/en/my-information/privacy

You may want to check "Targeting in external channels", "Item-level purchase data”, and "Analytics and customer grouping".

#privacy #dataprotection #enshittification

[–] [email protected] 1 points 1 month ago

@[email protected] I sure did. I also renamed the variable to a name that makes its existence obvious to anyone reading the code.

[–] [email protected] 1 points 1 month ago (1 children)

The code originally made a copy of a struct before modifying the copy. The original was then used afterwards. I entirely missed the later use and that it was critical that the original struct was used as is. So I passed a subtly modified struct to the later processing, which, in combination with a second bug I had introduced some time earlier, caused all kinds of havoc.

There was another bug I also introduced, which funnily had similar effects. This bug was added months ago, and it affected only older OS versions. I typically only run the bleeding version during development (but I had tested the change with older versions, too). Unfortunately, this issue was random as it depended on stack contents to get triggered, and thus went unnoticed until the additional scrutiny introduced this intense debugging session.

The combination of these factors made this highly frustrating thing to debug, as any kind of A-B testing fails when you have multiple or random issues.

#bugstories

 

I just spent untold hours debugging an issue I introduced myself by "removing an unnecessary variable".

The variable was necessary.

#development #programming

[–] [email protected] 1 points 2 months ago

@[email protected] "Nice flow you've going there, would be a shame if I had to reboot"

 

So #Microsoft will be monetising "not rebooting" #Windows: You can avoid security update-related reboots by paying for a monthly subscription.

For now, this feature will be available for Windows Server 2025, but I see great business potential in the consumer market...

https://www.forbes.com/sites/daveywinder/2025/04/28/microsoft-confirms-150-windows-security-update-fee-starts-july-1/

 

Game copy protection was an art form, as well as #cracking these protections. This cat and mouse game evolved over time, with protections including more and more complicated and well-hidden checks trying to identify poor or quickly made cracks. The best protections hindered the release of a crack long enough for the game to hit enough initial sales. After the initial sales the eventual release of a crack would no longer hurt (much).

Rewind to 2025 and legal purchase of early 90s PC games from palaces such as COG: Apparently, there are plenty of releases that have the poor crack built-in, and where the anti-crack checks kick in, making the game unplayable. The irony is that the only way to play is to get a proper "real crack".

Cool write-up of the protection in "The Games: Winter Challenge" and the associated problems of "legal releases":
https://mrwint.github.io/winter/writeup/writeup.html

#retrogaming #hacking

 

If there were a single thing I'd want to convey to potential future #cybersecurity professionals: Hacking is fun, but reporting is the most important part.

You can be the best hacker in the world, but all that is in vain if you can't convey what you did and how to prevent it.

You should spend time getting better at reporting, along with the technical skills.

#thoughtoftheday

 

The feeling when you notice a bug in your binutils port that has been generating semi-randomly broken branch relaxation trampolines for decades.

#programming #coding #oops

[–] [email protected] 2 points 2 months ago (1 children)

@[email protected] Ooof. I wonder if it's available in some states though, for example California? They have https://oag.ca.gov/privacy/ccpa

 

If you're a #facebook user, you can object to your information being used for #aItraining: https://www.facebook.com/help/contact/6359191084165019

As part of the process, they demand you to explain how the process impacts you. Of course, this is just another step to stop you from exercising your right to object. You can enter "I refuse to explain my reasons" or similar, and it will be equally valid as an actual explanation.

#privacy #enshittification

[–] [email protected] 6 points 2 months ago

This here is the prime example of why we must stay vigilant about the collection and dissemination of personal information.

Also, while this article only mentions "algorithm", it's not difficult to predict that AI models are or will be used for this kind of task.

AI advocates often claim that any plans to regulate AI are just a hindrance to progress. I will take regulation if it will stop this kind of madness.

[–] [email protected] 1 points 3 months ago

@[email protected] Sure, those methods might work for now. But if Microsoft follows their reasoning ("We’re removing X from the build to enhance security and user experience of Windows 11. This change ensures that all users exit setup with internet connectivity and a Microsoft Account.") they will remove these methods eventually as well.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago)

@infinity Yeah, it does for now. I fully expect Microsoft to remove that registry key or the associated functionality next.

After all not doing so would mean that users could accidentally setup the system "without working internet connectivity and a Microsoft Account".

That would be terrible for security and user experience *cough* business.

[–] [email protected] 2 points 3 months ago* (last edited 3 months ago)

@jerry It largely depends on how well the initial impact is cleaned up. I'm hoping we won't see a ton of backdoors in various components next.

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago)

The httpget 0.2 doesn't quite work in the form it was uploaded.

First it uses hardcoded argv, argc instead of getting from the app invocation (as args in main, the code uses void main).

Second obtaining any data from the socket will result in the app stopping and leaving behind an empty file (if (nread) break;).

This program could never download anything. It is likely some work in progress or modified test version of httpget. Since it includes some windows specific headers and has disabled the unix ones I can only presume it was some earlier attempt to get the tool running on windows.

So while the code has a local stack buffer overflow it can't be triggered for this early version.

[–] [email protected] 1 points 4 months ago

If this trend continues, we will be losing the ability to use secure means of communication with UK friends and colleagues. For example, #signalapp will rather get out of the UK than add backdoors: https://www.bbc.com/news/technology-64584001

view more: next ›