Today my hometown was shaken to the core by unspeakable horror. A frenzied attacker and former student shot eleven people including himself at a grammar school. My deepest condolences to the bereaved.
Today my hometown was shaken to the core by unspeakable horror. A frenzied attacker and former student shot eleven people including himself at a grammar school. My deepest condolences to the bereaved.
The embargo is over, so here it is: https://coderush.me/hydroph0bia-part1/
I can't stress the "NEVER USE NVRAM AS TRUSTED STORAGE" part harder, but now we all have a very nice example of a thing to not ever do, or have your SecureBoot and FW updater signing being vulnerable to all people who can set non-volatile RT variables by calling a dedicated OS API.
Over 84,000 instances of the Roundcube webmail software are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) vulnerability with a publicly available exploit.
New: A security researcher found a bug that revealed the private recovery phone number of almost any Google account.
TechCrunch verified the bug w/ the researcher, who quickly brute-forced the phone number of a test Google account we had set up.
https://techcrunch.com/2025/06/09/google-fixes-bug-that-could-reveal-users-private-phone-numbers/
DIMVA '25 takes place in Graz this year!
It’s the 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment.
Check out the @DIMVAConf program and register now:
https://www.dimva.org/dimva2025/
Bypassing MTE with CVE-2025-0072
Article by Man Yue Mo about exploiting a page use-after-free vulnerability in the ARM's Mali GPU driver in the code that manages userspace-mapped pages.
Author published an exploit for this bug that disable SELinux and gains root privileges on Pixel 8 running from the untrusted_app context. The exploit is not affected by MTE.
Article: https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
Great research by folks from IMDEA Networks, Radboud University, Digital Security Group & iHub, and COSIC, KU Leuven on the "localmess" disclosure (https://localmess.github.io/).
We have always known that native mobile apps will maximize the data collection and use whatever the operating system gives them as long as it doesn't cause a prompt (and often times even if it causes a prompt). 1/3
@rw Does not seem to be sandboxed properly, though. 🙂
@mirren Boosted, of course, and best of luck! 🤞
This is hard to write: My partner got ✨ eigenbedarf ✨ in his Munich flat. He lived there for over 10 years, always paid his rent on time, and adheres to my rather high cleaning standards. He's also quiet, a German citizen and overall a pleasant person. If you have any pointers on a flat in Munich, please let us know (:
(It's for one person; we don't live together and don't necessarily plan to do so. I visit about once a month, never longer than a few days).
OMG, GSW is back!
Our annual summer school on cybersecurity will open its doors in September!
You can look forward to five days of interesting talks, practical lab sessions, and a big social event. 😎☀️
📅 September 1st–5th, 2025
📍Aula, TU Graz, Rechbauerstraße 12
Register now!
https://securityweek.at/
🚨 #Messengerüberwachung in #Österreich
"@rene_mobile von der Universität #Linz sah die von Regierungsseite gewollte #Überwachung nur möglich, wenn #Sicherheitslücken genutzt würden, die man quasi staatlich fördere. Es werde damit in IT-Unsicherheit aller Geräte investiert, anstatt diese laufend zu verbessern."
#Messenger -Überwachung in #Österreich... Kritik an breiter Front #Datenschutz
Local vulnerabilities in Kea DHCP
Introducing #Unfixium. A material mix of plastic, glue, electronics that poses a riddle when trying to open it for repair. Unfixium often comes in the form of power bricks, rechargeable devices, routers and more. It does not forgive mistakes and immediately shatters into pieces that will never return to its original form, leaving you with the ruins of modern technology that can not even be recycled.
#Linux 6.15 is out:
https://lore.kernel.org/lkml/CAHk-=wiLRW8DN8-4jmeCZH0OpO8skXOC5e6FwMfsPwGMpQYmVQ@mail.gmail.com/
For a list of new features see a short news story from LWN.net (https://lwn.net/Articles/1022457 ) or their two in-depth articles (https://lwn.net/Articles/1015414/ & https://lwn.net/Articles/1016119/) as well as the kernelnewbies page on 6.15 that is still WIP (https://kernelnewbies.org/Linux_6.15 ).
Quote from the announcement:
'"So this was delayed by a couple of hours because of a last-minute bug report resulting in one new feature being disabled at the eleventh hour[1], but 6.15 is out there now.
Apart from that final scramble, things looked pretty normal last week. […]
And this obviously means that the merge window opens tomorrow as
usual […]
Anyway, please keep testing,
Linus"'
[1] Disable FOP_DONTCACHE for now due to bugs – https://git.kernel.org/torvalds/c/478ad02d6844217cc7568619aeb0809d93ade43d
Bosch versetzt spexor-Geräten den Todesstoß
Bosch schaltet den "mobilen Sicherheitsassistenten" spexor ab. Die Deaktivierung der Cloud-Server macht die teuren Geräte unbrauchbar.
#CloudDienste #InternetderDinge #IT #Mobiles #SmartHome #news