Forwarded from Mirraの杂货铺 | Link to World! (NekoMirra)
今天是中国互联网30岁的生日!🎉
无论如何,三十年间,它将亿万个你我相连,纵使远隔万里,亦能心意相通!
让我们期待下一个三十年是什么样子吧!
无论如何,三十年间,它将亿万个你我相连,纵使远隔万里,亦能心意相通!
让我们期待下一个三十年是什么样子吧!
❤3
Forwarded from 咕 Billchan 咕 🐱 抹茶芭菲批发中心 (billchenchina | Nya!)
git CVE-2024-32002, CVE-2024-32004, CVE-2024-32020 and CVE-2024-32021
fixed versions: v2.39.4, v2.40.2, v2.41.1, v2.42.2, v2.43.4 and v2.44.1, v2.45.1
* CVE-2024-32002:
Recursive clones on case-insensitive filesystems that support symbolic
links are susceptible to case confusion that can be exploited to
execute just-cloned code during the clone operation.
* CVE-2024-32004:
Repositories can be configured to execute arbitrary code during local
clones. To address this, the ownership checks introduced in v2.30.3
are now extended to cover cloning local repositories.
* CVE-2024-32020:
Local clones may end up hardlinking files into the target repository's
object database when source and target repository reside on the same
disk. If the source repository is owned by a different user, then
those hardlinked files may be rewritten at any point in time by the
untrusted user.
* CVE-2024-32021:
When cloning a local source repository that contains symlinks via the
filesystem, Git may create hardlinks to arbitrary user-readable files
on the same filesystem as the target repository in the objects/
directory.
fixed versions: v2.39.4, v2.40.2, v2.41.1, v2.42.2, v2.43.4 and v2.44.1, v2.45.1
* CVE-2024-32002:
Recursive clones on case-insensitive filesystems that support symbolic
links are susceptible to case confusion that can be exploited to
execute just-cloned code during the clone operation.
* CVE-2024-32004:
Repositories can be configured to execute arbitrary code during local
clones. To address this, the ownership checks introduced in v2.30.3
are now extended to cover cloning local repositories.
* CVE-2024-32020:
Local clones may end up hardlinking files into the target repository's
object database when source and target repository reside on the same
disk. If the source repository is owned by a different user, then
those hardlinked files may be rewritten at any point in time by the
untrusted user.
* CVE-2024-32021:
When cloning a local source repository that contains symlinks via the
filesystem, Git may create hardlinks to arbitrary user-readable files
on the same filesystem as the target repository in the objects/
directory.
Forwarded from 橘橘橘子汁 & 🍊
OpenSSH 鉴权超时终止会话时信号竞态条件漏洞 [CVE-2024-6387]
可远程攻击, 可拿root shell, 影响 openssh 版本 <4.4p1, 8.5p1~9.8p1, 预计x64下连续打一周能出。
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
https://www.openssh.com/txt/release-9.8
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://github.com/gentoo/gentoo/pull/22961
https://github.com/NixOS/nixpkgs/pull/323768
可远程攻击, 可拿root shell, 影响 openssh 版本 <4.4p1, 8.5p1~9.8p1, 预计x64下连续打一周能出。
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
https://www.openssh.com/txt/release-9.8
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://github.com/gentoo/gentoo/pull/22961
https://github.com/NixOS/nixpkgs/pull/323768
😱4👍2
【立创离大谱BUG之【旋转一分钟】-哔哩哔哩】 https://www.bilibili.com/video/BV1yS421R7g5?p=1
省流: Web 版 LCEDA 属性没写好,把 class 的右边引号和 text 的左边引号弄成 "e 了
省流: Web 版 LCEDA 属性没写好,把 class 的右边引号和 text 的左边引号弄成 "e 了
Bilibili
立创离大谱BUG之【旋转一分钟】_哔哩哔哩_bilibili
复现:浏览器版LCEDA,名称以with rotation结尾, 视频播放量 27124、弹幕量 25、点赞数 794、投硬币枚数 74、收藏人数 346、转发人数 450, 视频作者 珞林ltyxh, 作者简介 博客tianyi.vc 总是想太多还不如什么都别想,相关视频:画个模块 | TypeC可调输出模块,手把手教你做基于stm32+esp8266+MQTT+小程序的智慧大棚—3.PCB绘制,CAD中使用deepseek写插件真的太溜了,而且非常实用!,【ESP-IDF】01-从画板开始教你使用ESP…
Forwarded from 风向旗参考快讯
AMD 公布严重漏洞:影响数亿个CPU,几乎无法修复
“Sinkclose” 是最近发现的一个重大安全漏洞的名称,该漏洞影响了自 2006 年以来发布的几乎所有 AMD 处理器。此漏洞允许攻击者深入渗透系统,使得检测或删除恶意软件变得极其困难。据Wired报道,这个问题非常严重,在某些情况下,放弃受感染的机器可能比修复它更容易 。
不过,也有好消息:由于该漏洞 18 年来一直未被发现,因此很可能未被利用过。此外,AMD 正在 修补 其平台以保护它们,尽管并非所有受影响的处理器都已收到补丁。
—— tom's Hardware
“Sinkclose” 是最近发现的一个重大安全漏洞的名称,该漏洞影响了自 2006 年以来发布的几乎所有 AMD 处理器。此漏洞允许攻击者深入渗透系统,使得检测或删除恶意软件变得极其困难。据Wired报道,这个问题非常严重,在某些情况下,放弃受感染的机器可能比修复它更容易 。
不过,也有好消息:由于该漏洞 18 年来一直未被发现,因此很可能未被利用过。此外,AMD 正在 修补 其平台以保护它们,尽管并非所有受影响的处理器都已收到补丁。
Sinkclose 漏洞允许黑客在 AMD 处理器的系统管理模式 (SMM) 中执行代码,这是一个通常为关键固件操作保留的高权限区域。要利用此漏洞,攻击者必须首先获得系统内核的访问权限,这并不容易,但并非不可能。不过,系统必须已经受到其他攻击的攻击。
一旦获得这种访问权限,Sinkclose 漏洞就会允许犯罪者安装可以逃避标准防病毒工具检测的 bootkit 恶意软件,这种恶意软件在系统中几乎不可见,并且即使在重新安装操作系统后仍能持续存在。
该漏洞利用了 AMD 芯片中名为 TClose 的模糊功能,该功能旨在保持与旧设备的兼容性。通过操纵此功能,研究人员能够重定向处理器以在 SMM 级别执行自己的代码。这种方法很复杂,但为攻击者提供了对系统的深度和持久控制。
—— tom's Hardware
🤯10
Forwarded from 🐱MiaoTony's Box | 困困困 zzz (MiaoTony 🐱)
#今天又看了啥 #security #Windows #CVE #RCE #IPv6
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVSS:3.1 9.8 / 8.5
Max Severity: Critical
An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.
什么?一个整数溢出漏洞,未授权攻击者反复发精心构造的 IPv6 包就能直接 RCE?
而且影响所有受支持的 Windows 版本,包括即将发布的 Windows 11 版本 24H2
Mitigation: Systems are not affected if IPv6 is disabled on the target machine.
退 IPv6 网保平安
微软已在8月13日发布了相关安全更新
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVSS:3.1 9.8 / 8.5
Max Severity: Critical
An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.
什么?一个整数溢出漏洞,未授权攻击者反复发精心构造的 IPv6 包就能直接 RCE?
而且影响所有受支持的 Windows 版本,包括即将发布的 Windows 11 版本 24H2
Mitigation: Systems are not affected if IPv6 is disabled on the target machine.
微软已在8月13日发布了相关安全更新
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
Forwarded from 摸鱼集市 (魔法小猫)
来源:是谁在LINUX内核中开了这个大洞?
https://mp.weixin.qq.com/s/Sr4qIy-AdLhpkus6q1su9w
讨论串:Thread by @evilsocket on Thread Reader App – Thread Reader App https://threadreaderapp.com/thread/1838169889330135132.html
https://mp.weixin.qq.com/s/Sr4qIy-AdLhpkus6q1su9w
讨论串:Thread by @evilsocket on Thread Reader App – Thread Reader App https://threadreaderapp.com/thread/1838169889330135132.html
Threadreaderapp
Thread by @evilsocket on Thread Reader App
@evilsocket: * Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago. * Full disclosure happening in less than 2 weeks (as agreed with devs). * Still no CVE assigned (there should be at...…
😱5
Forwarded from 层叠 - The Cascading
#PSA: 请立即升级 - Firefox 远程代码执行漏洞。
请升级至 Firefox 131.0.2、Firefox ESR 128.3.1 或 Firefox ESR 115.16.1。
mozilla.org/~
CVE: CVE-2024-9680
CVSS: (Critical)
#Firefox
请升级至 Firefox 131.0.2、Firefox ESR 128.3.1 或 Firefox ESR 115.16.1。
mozilla.org/~
CVE: CVE-2024-9680
CVSS: (Critical)
#Firefox
Mozilla
Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
😱11🤔1
Forwarded from AIGC
OpenWrt 宣布重大变更:从 2024 年 11 月起,主开发分支和未来稳定版本(包括即将发布的 24.10 系列)将使用新的包管理器 apk 替代原有的 opkg。这一变化标志着 OpenWrt 平台发展的重要里程碑,opkg 已被弃用并不再包含在 OpenWrt 中。由于这是安装和管理包方式的根本性转变,社区正在 [论坛](https://forum.openwrt.org/t/the-future-is-now-opkg-vs-apk/201164) 中积极讨论新系统的选项和语法。请注意,此变更不影响 23.05 版本,截至 2024 年 11 月 15 日,24.10 分支仍使用 opkg。
https://forum.openwrt.org/t/major-change-notice-new-package-manager/215682
#OpenWrt #PackageManager #TechnologyUpdate
#AIGC
https://forum.openwrt.org/t/major-change-notice-new-package-manager/215682
#OpenWrt #PackageManager #TechnologyUpdate
#AIGC
OpenWrt Forum
The future is now: opkg vs apk
apk has replaced opkg in main branch SNAPSHOT builds The apk switchover is complete. It is the package manager not only in main snapshot, but on the 25.12 release branch. opkg will soon be relegated to history. @ynezz has graciously copied out the…
👏3