Re: Come watch a live stream coding session for the Hurd Video

2024-06-02 Thread Sergey Bugaev
On Sun, Jun 2, 2024 at 12:22 AM Joshua Branson wrote: > So we had an awesome time today watching Sergey code a trivial translator (1) > and do > some glibc hacking (2). Sergey coded and chatted for 4 and 1/2 hours! Three > cheers > for that kind of commitment! Thanks pal! > > In the

Re: Come watch a live stream coding session for the Hurd

2024-05-31 Thread Sergey Bugaev
Hi, On Fri, May 31, 2024 at 3:18 PM Almudena Garcia wrote: > Other idea could be a magnet/torrent translator > > wget magnet:?fl=http://... > > and downloading the torrent file without a torrent client bittorrentfs would be cool indeed, and it's something that I wanted to write for a long time

[VULN 2/4] No read-only mappings

2021-11-02 Thread Sergey Bugaev
Short description = A single pager port is shared between anyone who mmaps a file, allowing anyone to modify any files they can read. This can be trivially exploited to get full root access to the system. Background: Mach memory objects === Mach has

[VULN 4/4] Process auth man-in-the-middle

2021-11-02 Thread Sergey Bugaev
Short description = The use of authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access to the system. Background: authentication == Here, the

[VULN 3/4] setuid exec race

2021-11-02 Thread Sergey Bugaev
Short description = When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access to the system.

[VULN 0/4] Hurd vulnerability details

2021-11-02 Thread Sergey Bugaev
Hello! As promised [0], here are the details of the Hurd vulnerabilities I have found earlier this year [1] [2]. [0]: https://lists.gnu.org/archive/html/bug-hurd/2021-10/msg6.html [1]: https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html [2]:

[VULN 1/4] Fake notifications

2021-11-02 Thread Sergey Bugaev
Short description = libports accepts fake notification messages from any client on any port, which can lead to port use-after-free, which can be exploited for local privilege escalation to get full root access to the system. Background: Mach notifications

Re: Regarding copyright assignment to FSF

2021-08-15 Thread Sergey Bugaev
On Sat, Aug 14, 2021 at 8:43 AM Michael Banck wrote: > The fact that this process potentially or apparently took (or rather, > has been taking) months for Sergey (I don't know when it was initiated), > is a pretty good indicator that it is more than a nuisance. Well, this is partly my own fault: