Forwarded from Mirraの杂货铺 | Link to World! (NekoMirra)
今天是中国互联网30岁的生日!🎉
无论如何,三十年间,它将亿万个你我相连,纵使远隔万里,亦能心意相通!
让我们期待下一个三十年是什么样子吧!
无论如何,三十年间,它将亿万个你我相连,纵使远隔万里,亦能心意相通!
让我们期待下一个三十年是什么样子吧!
❤3
Forwarded from 咕 Billchan 咕 🐱 抹茶芭菲批发中心 (billchenchina | Nya!)
git CVE-2024-32002, CVE-2024-32004, CVE-2024-32020 and CVE-2024-32021
fixed versions: v2.39.4, v2.40.2, v2.41.1, v2.42.2, v2.43.4 and v2.44.1, v2.45.1
* CVE-2024-32002:
Recursive clones on case-insensitive filesystems that support symbolic
links are susceptible to case confusion that can be exploited to
execute just-cloned code during the clone operation.
* CVE-2024-32004:
Repositories can be configured to execute arbitrary code during local
clones. To address this, the ownership checks introduced in v2.30.3
are now extended to cover cloning local repositories.
* CVE-2024-32020:
Local clones may end up hardlinking files into the target repository's
object database when source and target repository reside on the same
disk. If the source repository is owned by a different user, then
those hardlinked files may be rewritten at any point in time by the
untrusted user.
* CVE-2024-32021:
When cloning a local source repository that contains symlinks via the
filesystem, Git may create hardlinks to arbitrary user-readable files
on the same filesystem as the target repository in the objects/
directory.
fixed versions: v2.39.4, v2.40.2, v2.41.1, v2.42.2, v2.43.4 and v2.44.1, v2.45.1
* CVE-2024-32002:
Recursive clones on case-insensitive filesystems that support symbolic
links are susceptible to case confusion that can be exploited to
execute just-cloned code during the clone operation.
* CVE-2024-32004:
Repositories can be configured to execute arbitrary code during local
clones. To address this, the ownership checks introduced in v2.30.3
are now extended to cover cloning local repositories.
* CVE-2024-32020:
Local clones may end up hardlinking files into the target repository's
object database when source and target repository reside on the same
disk. If the source repository is owned by a different user, then
those hardlinked files may be rewritten at any point in time by the
untrusted user.
* CVE-2024-32021:
When cloning a local source repository that contains symlinks via the
filesystem, Git may create hardlinks to arbitrary user-readable files
on the same filesystem as the target repository in the objects/
directory.
Forwarded from 橘橘橘子汁 & 🍊
OpenSSH 鉴权超时终止会话时信号竞态条件漏洞 [CVE-2024-6387]
可远程攻击, 可拿root shell, 影响 openssh 版本 <4.4p1, 8.5p1~9.8p1, 预计x64下连续打一周能出。
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
https://www.openssh.com/txt/release-9.8
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://github.com/gentoo/gentoo/pull/22961
https://github.com/NixOS/nixpkgs/pull/323768
可远程攻击, 可拿root shell, 影响 openssh 版本 <4.4p1, 8.5p1~9.8p1, 预计x64下连续打一周能出。
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
https://www.openssh.com/txt/release-9.8
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://github.com/gentoo/gentoo/pull/22961
https://github.com/NixOS/nixpkgs/pull/323768
😱4👍2
【立创离大谱BUG之【旋转一分钟】-哔哩哔哩】 https://www.bilibili.com/video/BV1yS421R7g5?p=1
省流: Web 版 LCEDA 属性没写好,把 class 的右边引号和 text 的左边引号弄成 "e 了
省流: Web 版 LCEDA 属性没写好,把 class 的右边引号和 text 的左边引号弄成 "e 了
Bilibili
立创离大谱BUG之【旋转一分钟】_哔哩哔哩_bilibili
复现:浏览器版LCEDA,名称以with rotation结尾, 视频播放量 27124、弹幕量 25、点赞数 794、投硬币枚数 74、收藏人数 346、转发人数 450, 视频作者 珞林ltyxh, 作者简介 博客tianyi.vc 总是想太多还不如什么都别想,相关视频:画个模块 | TypeC可调输出模块,手把手教你做基于stm32+esp8266+MQTT+小程序的智慧大棚—3.PCB绘制,CAD中使用deepseek写插件真的太溜了,而且非常实用!,【ESP-IDF】01-从画板开始教你使用ESP…
Forwarded from 风向旗参考快讯
AMD 公布严重漏洞:影响数亿个CPU,几乎无法修复
“Sinkclose” 是最近发现的一个重大安全漏洞的名称,该漏洞影响了自 2006 年以来发布的几乎所有 AMD 处理器。此漏洞允许攻击者深入渗透系统,使得检测或删除恶意软件变得极其困难。据Wired报道,这个问题非常严重,在某些情况下,放弃受感染的机器可能比修复它更容易 。
不过,也有好消息:由于该漏洞 18 年来一直未被发现,因此很可能未被利用过。此外,AMD 正在 修补 其平台以保护它们,尽管并非所有受影响的处理器都已收到补丁。
—— tom's Hardware
“Sinkclose” 是最近发现的一个重大安全漏洞的名称,该漏洞影响了自 2006 年以来发布的几乎所有 AMD 处理器。此漏洞允许攻击者深入渗透系统,使得检测或删除恶意软件变得极其困难。据Wired报道,这个问题非常严重,在某些情况下,放弃受感染的机器可能比修复它更容易 。
不过,也有好消息:由于该漏洞 18 年来一直未被发现,因此很可能未被利用过。此外,AMD 正在 修补 其平台以保护它们,尽管并非所有受影响的处理器都已收到补丁。
Sinkclose 漏洞允许黑客在 AMD 处理器的系统管理模式 (SMM) 中执行代码,这是一个通常为关键固件操作保留的高权限区域。要利用此漏洞,攻击者必须首先获得系统内核的访问权限,这并不容易,但并非不可能。不过,系统必须已经受到其他攻击的攻击。
一旦获得这种访问权限,Sinkclose 漏洞就会允许犯罪者安装可以逃避标准防病毒工具检测的 bootkit 恶意软件,这种恶意软件在系统中几乎不可见,并且即使在重新安装操作系统后仍能持续存在。
该漏洞利用了 AMD 芯片中名为 TClose 的模糊功能,该功能旨在保持与旧设备的兼容性。通过操纵此功能,研究人员能够重定向处理器以在 SMM 级别执行自己的代码。这种方法很复杂,但为攻击者提供了对系统的深度和持久控制。
—— tom's Hardware
🤯10
Forwarded from 🐱MiaoTony's Box | 困困困 zzz (MiaoTony 🐱)
#今天又看了啥 #security #Windows #CVE #RCE #IPv6
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVSS:3.1 9.8 / 8.5
Max Severity: Critical
An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.
什么?一个整数溢出漏洞,未授权攻击者反复发精心构造的 IPv6 包就能直接 RCE?
而且影响所有受支持的 Windows 版本,包括即将发布的 Windows 11 版本 24H2
Mitigation: Systems are not affected if IPv6 is disabled on the target machine.
退 IPv6 网保平安
微软已在8月13日发布了相关安全更新
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVSS:3.1 9.8 / 8.5
Max Severity: Critical
An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.
什么?一个整数溢出漏洞,未授权攻击者反复发精心构造的 IPv6 包就能直接 RCE?
而且影响所有受支持的 Windows 版本,包括即将发布的 Windows 11 版本 24H2
Mitigation: Systems are not affected if IPv6 is disabled on the target machine.
微软已在8月13日发布了相关安全更新
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
Forwarded from 摸鱼集市 (魔法小猫)
来源:是谁在LINUX内核中开了这个大洞?
https://mp.weixin.qq.com/s/Sr4qIy-AdLhpkus6q1su9w
讨论串:Thread by @evilsocket on Thread Reader App – Thread Reader App https://threadreaderapp.com/thread/1838169889330135132.html
https://mp.weixin.qq.com/s/Sr4qIy-AdLhpkus6q1su9w
讨论串:Thread by @evilsocket on Thread Reader App – Thread Reader App https://threadreaderapp.com/thread/1838169889330135132.html
Threadreaderapp
Thread by @evilsocket on Thread Reader App
@evilsocket: * Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago. * Full disclosure happening in less than 2 weeks (as agreed with devs). * Still no CVE assigned (there should be at...…
😱5
Forwarded from 层叠 - The Cascading
#PSA: 请立即升级 - Firefox 远程代码执行漏洞。
请升级至 Firefox 131.0.2、Firefox ESR 128.3.1 或 Firefox ESR 115.16.1。
mozilla.org/~
CVE: CVE-2024-9680
CVSS: (Critical)
#Firefox
请升级至 Firefox 131.0.2、Firefox ESR 128.3.1 或 Firefox ESR 115.16.1。
mozilla.org/~
CVE: CVE-2024-9680
CVSS: (Critical)
#Firefox
Mozilla
Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
😱11🤔1