<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>SLF Digest</title>
  <id>https://slf.fish/</id>
  <link href="https://slf.fish/" />
  <link rel="self" type="application/atom+xml" href="https://slf.fish/feed.atom" />
  <author><name>SLF</name></author>
  <updated>2026-04-08T00:00:00Z</updated>

  
  <entry>
    <title>SLF Digest 2026 Q1</title>
    <id>https://slf.fish/mirror/26q1/</id>
    <link href="https://slf.fish/mirror/26q1/" />
    <updated>2026-04-08T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Pixel 9 0-click exploit chain
    
    
      <br><a href="https://infosec.place/notice/B2JlRznq9ea14XuD32">https://infosec.place/notice/B2JlRznq9ea14XuD32</a>
    
  </li>

  <li>
    HackerBot Claw
    
    
      <br><a href="https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation">https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation</a>
    
  </li>

  <li>
    Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
    
    
      <br><a href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit</a>
    
  </li>

  <li>
    CosmicHammer: detecting naturally-occurring bitflips.
    
    
      <br><a href="https://github.com/fuzzsociety/CosmicHammer">https://github.com/fuzzsociety/CosmicHammer</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2025 Q4</title>
    <id>https://slf.fish/mirror/25q4/</id>
    <link href="https://slf.fish/mirror/25q4/" />
    <updated>2026-01-12T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Cross-container communication using POSIX Advisory Locks
    
    
      <br><a href="https://h4x0r.org/funreliable">https://h4x0r.org/funreliable</a>
    
  </li>

  <li>
    Controlled memory write with disabled denormalized floats in Chrome
    
    
      <br><a href="https://issues.chromium.org/issues/382005099#comment19">https://issues.chromium.org/issues/382005099#comment19</a>
    
  </li>

  <li>
    Breaking Trusted Execution Environments via DDR5 Memory Bus Interposition
    
    
      <br><a href="https://tee.fail/">https://tee.fail/</a>
    
  </li>

  <li>
    Nvidia UAF Kernel Bug
    
    
      <br><a href="https://blog.quarkslab.com/nvidia_gpu_kernel_vmalloc_exploit.html">https://blog.quarkslab.com/nvidia_gpu_kernel_vmalloc_exploit.html</a>
    
  </li>

  <li>
    Glass Cage: Zero-Click PNG Exploit Chain for iOS 18.2.1
    
    
      <br><a href="https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201">https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201</a><br><a href="https://seclists.org/fulldisclosure/2025/Oct/1">https://seclists.org/fulldisclosure/2025/Oct/1</a>
    
  </li>

  <li>
    <b>[clown cracker]</b> sudo-rs reveals password on timeout; allows running commands as any user
    <br><em>Take a conceptually wrong idea (sudo) and re-write it in a sekure language only to obtain a security hole.</em>
    
      <br><a href="https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw">https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw</a><br><a href="https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-q428-6v73-fc4q">https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-q428-6v73-fc4q</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2025 Q3</title>
    <id>https://slf.fish/mirror/25q3/</id>
    <link href="https://slf.fish/mirror/25q3/" />
    <updated>2025-09-30T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    SwissBorg watched $41.5M in SOL vanish through Kiln&amp;#x27;s backdoor
    
    
      <br><a href="https://rekt.news/swissborg-rekt">https://rekt.news/swissborg-rekt</a>
    
  </li>

  <li>
    Apple A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure
    
    
      <br><a href="https://seclists.org/fulldisclosure/2025/Sep/0">https://seclists.org/fulldisclosure/2025/Sep/0</a><br><a href="https://github.com/JGoyd/Apple-Silicon-A17-Flaw">https://github.com/JGoyd/Apple-Silicon-A17-Flaw</a>
    
  </li>

  <li>
    Obtaining Global Admin in every Entra ID tenant via Actor tokens
    
    
      <br><a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/</a>
    
  </li>

  <li>
    NPM Supply Chain Attack: What we know about it
    
    
      <br><a href="https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html">https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2025 Q1</title>
    <id>https://slf.fish/mirror/25q1/</id>
    <link href="https://slf.fish/mirror/25q1/" />
    <updated>2025-03-03T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Mossad&amp;#x27;s pagers &amp;amp; walkie-talkies sabotage operations
    <br><em>No reliable details source available</em>
    
      <br><a href="https://en.wikipedia.org/wiki/2024_Lebanon_electronic_device_attacks">https://en.wikipedia.org/wiki/2024_Lebanon_electronic_device_attacks</a>
    
  </li>

  <li>
    Hackers deployed to facilitate drug smuggling
    
    
      <br><a href="https://www.europol.europa.eu/sites/default/files/documents/cyberbits_04_ocean13.pdf">https://www.europol.europa.eu/sites/default/files/documents/cyberbits_04_ocean13.pdf</a>
    
  </li>

  <li>
    The invalid 68030 instruction that accidentally allowed the Mac Classic II to boot
    
    
      <br><a href="https://www.downtowndougbrown.com/2025/01/the-invalid-68030-instruction-that-accidentally-allowed-the-mac-classic-ii-to-successfully-boot-up/">https://www.downtowndougbrown.com/2025/01/the-invalid-68030-instruction-that-accidentally-allowed-the-mac-classic-ii-to-successfully-boot-up/</a>
    
  </li>

  <li>
    LinuxPDF: Linux running inside a PDF file via a RISC-V emulator
    
    
      <br><a href="https://github.com/ading2210/linuxpdf">https://github.com/ading2210/linuxpdf</a>
    
  </li>

  <li>
    CVE-2025-26465: MitM attack against OpenSSH VerifyHostKeyDNS &amp;amp; CVE-2025-26466: DoS against OpenSSH client&amp;#x2F;server
    
    
      <br><a href="https://www.openwall.com/lists/oss-security/2025/02/18/1">https://www.openwall.com/lists/oss-security/2025/02/18/1</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2024 Q3</title>
    <id>https://slf.fish/mirror/24q3/</id>
    <link href="https://slf.fish/mirror/24q3/" />
    <updated>2024-09-10T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    RegreSSHion — Remote unauthenticated RCE in OpenSSH
    
    
      <br><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server</a><br><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt">https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt</a>
    
  </li>

  <li>
    When Samsung meets MediaTek: the story of a small bug chain
    
    
      <br><a href="https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf">https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf</a>
    
  </li>

  <li>
    EUCLEAK
    
    
      <br><a href="https://ninjalab.io/eucleak/">https://ninjalab.io/eucleak/</a><br><a href="https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf">https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf</a>
    
  </li>

  <li>
    PassPort: Forwarding TCP ports through Passkey servers to bypass censorship
    
    
      <br><a href="https://github.com/c-skills/passport/">https://github.com/c-skills/passport/</a>
    
  </li>

  <li>
    We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
    
    
      <br><a href="https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/">https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2024 H1</title>
    <id>https://slf.fish/mirror/24h1/</id>
    <link href="https://slf.fish/mirror/24h1/" />
    <updated>2024-06-01T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    XZ Utils backdoor in liblzma and JiaT75&amp;#x27;s operation
    
    
      <br><a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">https://www.openwall.com/lists/oss-security/2024/03/29/4</a><br><a href="https://tukaani.org/xz-backdoor/">https://tukaani.org/xz-backdoor/</a><br><a href="https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils#latest-wiz-research-findings-as-of-april-3-2024-33">https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils#latest-wiz-research-findings-as-of-april-3-2024-33</a><br><a href="https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27">https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27</a>
    
  </li>

  <li>
    Randar Minecraft exploit
    
    
      <br><a href="https://github.com/spawnmason/randar-explanation">https://github.com/spawnmason/randar-explanation</a>
    
  </li>

  <li>
    PuTTY biased ECDSA-P-521 nonces
    
    
      <br><a href="https://www.openwall.com/lists/oss-security/2024/04/15/6">https://www.openwall.com/lists/oss-security/2024/04/15/6</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2023 Q4</title>
    <id>https://slf.fish/mirror/23q4/</id>
    <link href="https://slf.fish/mirror/23q4/" />
    <updated>2024-01-21T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Operation Triangulation: The last (hardware) mystery
    
    
      <br><a href="https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/">https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/</a>
    
  </li>

  <li>
    An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html">https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html</a>
    
  </li>

  <li>
    A Study on Implementation Attacks against QKD Systems
    
    
      <br><a href="https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Studien/QKD-Systems/Implementation_Attacks_QKD_Systems_node.html">https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Studien/QKD-Systems/Implementation_Attacks_QKD_Systems_node.html</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2023 Q3</title>
    <id>https://slf.fish/mirror/23q3/</id>
    <link href="https://slf.fish/mirror/23q3/" />
    <updated>2023-10-14T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    CVE-2023-38408: Remote Code Execution in OpenSSH&amp;#x27;s forwarded ssh-agent
    
    
      <br><a href="https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt">https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt</a>
    
  </li>

  <li>
    Compromised Microsoft MSA key by Storm-0558
    
    
      <br><a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/</a><br><a href="https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr">https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr</a>
    
  </li>

  <li>
    Looney Tunables: Local Privilege Escalation in glibc&amp;#x27;s ld.so (CVE-2023-4911)
    
    
      <br><a href="https://www.openwall.com/lists/oss-security/2023/10/03/2">https://www.openwall.com/lists/oss-security/2023/10/03/2</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2023 Q2</title>
    <id>https://slf.fish/mirror/23q2/</id>
    <link href="https://slf.fish/mirror/23q2/" />
    <updated>2023-07-06T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    SectorC: A C Compiler in 512 bytes
    
    
      <br><a href="https://xorvoid.com/sectorc.html">https://xorvoid.com/sectorc.html</a>
    
  </li>

  <li>
    faulTPM: Exposing AMD fTPMs&amp;#x27; Deepest Secrets
    
    
      <br><a href="https://arxiv.org/abs/2304.14717">https://arxiv.org/abs/2304.14717</a><br><a href="https://github.com/PSPReverse/ftpm_attack">https://github.com/PSPReverse/ftpm_attack</a>
    
  </li>

  <li>
    acme.sh runs arbitrary commands from a remote server
    
    
      <br><a href="https://github.com/acmesh-official/acme.sh/issues/4659">https://github.com/acmesh-official/acme.sh/issues/4659</a>
    
  </li>

  <li>
    Accidental $70k Google Pixel Lock Screen Bypass
    
    
      <br><a href="https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/">https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2023 Q1</title>
    <id>https://slf.fish/mirror/23q1/</id>
    <link href="https://slf.fish/mirror/23q1/" />
    <updated>2023-04-02T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    OpenSSH Pre-Auth Double Free CVE-2023-25136
    
    
      <br><a href="https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/">https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/</a>
    
  </li>

  <li>
    Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game
    
    
      <br><a href="https://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game/">https://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game/</a>
    
  </li>

  <li>
    BlackLotus UEFI bootkit
    
    
      <br><a href="https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/">https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/</a>
    
  </li>

  <li>
    Exploiting aCropalypse: Recovering Truncated PNGs
    
    
      <br><a href="https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html">https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2022 Q4</title>
    <id>https://slf.fish/mirror/22q4/</id>
    <link href="https://slf.fish/mirror/22q4/" />
    <updated>2023-01-22T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    The destruction of FTX by CZ
    
    
      <br><a href="https://twitter.com/SBF_FTX/status/1601191234034274304">https://twitter.com/SBF_FTX/status/1601191234034274304</a>
    
  </li>

  <li>
    The Profanity vanity address generator bug
    
    
      <br><a href="https://blog.safeheron.com/blog/insights/safeheron-originals/a-deep-dive-of-how-profanity-caused-wintermute-to-lose-usd160m">https://blog.safeheron.com/blog/insights/safeheron-originals/a-deep-dive-of-how-profanity-caused-wintermute-to-lose-usd160m</a>
    
  </li>

  <li>
    The Android certificates leak
    
    
      <br><a href="https://bugs.chromium.org/p/apvi/issues/detail?id=100">https://bugs.chromium.org/p/apvi/issues/detail?id=100</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2022 Q3</title>
    <id>https://slf.fish/mirror/22q3/</id>
    <link href="https://slf.fish/mirror/22q3/" />
    <updated>2022-09-23T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Doom-in-Doom
    
    
      <br><a href="https://github.com/kgsws/doom-in-doom">https://github.com/kgsws/doom-in-doom</a>
    
  </li>

  <li>
    MicrocodeDecryptor
    
    
      <br><a href="https://github.com/chip-red-pill/MicrocodeDecryptor">https://github.com/chip-red-pill/MicrocodeDecryptor</a>
    
  </li>

  <li>
    Custom Processing Unit
    
    
      <br><a href="https://github.com/pietroborrello/CustomProcessingUnit">https://github.com/pietroborrello/CustomProcessingUnit</a>
    
  </li>

  <li>
    An efficient key recovery attack on SIDH + You could have broken SIDH
    
    
      <br><a href="https://eprint.iacr.org/2022/975">https://eprint.iacr.org/2022/975</a><br><a href="https://yx7.cc/blah/2022-08-22.html">https://yx7.cc/blah/2022-08-22.html</a>
    
  </li>

  <li>
    Process injection: breaking all macOS security layers with a single vulnerability
    
    
      <br><a href="https://sector7.computest.nl/post/2022-08-process-injection-breaking-all-macos-security-layers-with-a-single-vulnerability/">https://sector7.computest.nl/post/2022-08-process-injection-breaking-all-macos-security-layers-with-a-single-vulnerability/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2022 Q2</title>
    <id>https://slf.fish/mirror/22q2/</id>
    <link href="https://slf.fish/mirror/22q2/" />
    <updated>2022-07-07T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    &amp;quot;ExtraReplica&amp;quot; — cross-account database vulnerability in Azure PostgreSQL
    
    
      <br><a href="https://www.wiz.io/blog/wiz-research-discovers-extrareplica-cross-account-database-vulnerability-in-azure-postgresql/">https://www.wiz.io/blog/wiz-research-discovers-extrareplica-cross-account-database-vulnerability-in-azure-postgresql/</a>
    
  </li>

  <li>
    Exploiting Intel Graphics Kernel Extensions on macOS — Pwn2Own 2021 Safari Sandbox Escape
    
    
      <br><a href="https://blog.ret2.io/2022/06/29/pwn2own-2021-safari-sandbox-intel-graphics-exploit/">https://blog.ret2.io/2022/06/29/pwn2own-2021-safari-sandbox-intel-graphics-exploit/</a>
    
  </li>

  <li>
    Notes on OpenSSL remote memory corruption
    
    
      <br><a href="https://guidovranken.com/2022/06/27/notes-on-openssl-remote-memory-corruption/">https://guidovranken.com/2022/06/27/notes-on-openssl-remote-memory-corruption/</a>
    
  </li>

  <li>
    <b>[idiot security prize]</b> Idiot Security Prize
    
    
      <br><a href="https://seclists.org/oss-sec/2022/q3/17">https://seclists.org/oss-sec/2022/q3/17</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2022 Q1</title>
    <id>https://slf.fish/mirror/22q1/</id>
    <link href="https://slf.fish/mirror/22q1/" />
    <updated>2022-04-12T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Winning a $31337 Bounty after Pwning Ubuntu and Escaping Google&amp;#x27;s KCTF Containers
    
    
      <br><a href="https://www.willsroot.io/2022/01/cve-2022-0185.html">https://www.willsroot.io/2022/01/cve-2022-0185.html</a>
    
  </li>

  <li>
    DeFi protocol KLAYswap theft via BGP hijack
    
    
      <br><a href="https://therecord.media/klayswap-crypto-users-lose-funds-after-bgp-hijack/">https://therecord.media/klayswap-crypto-users-lose-funds-after-bgp-hijack/</a>
    
  </li>

  <li>
    A one in a million bug in Switch kernel
    
    
      <br><a href="https://gist.githubusercontent.com/plutooo/2aadbd4a718e269df474079dd2e584fb/raw/7b3af77b5202366c8934c88ef251f1e905967040/gistfile1.txt">https://gist.githubusercontent.com/plutooo/2aadbd4a718e269df474079dd2e584fb/raw/7b3af77b5202366c8934c88ef251f1e905967040/gistfile1.txt</a>
    
  </li>

  <li>
    Win32 MMIO kernel exploit
    
    
      <br><a href="https://msrc-blog.microsoft.com/2022/03/22/exploring-a-new-class-of-kernel-exploit-primitive/">https://msrc-blog.microsoft.com/2022/03/22/exploring-a-new-class-of-kernel-exploit-primitive/</a>
    
  </li>

  <li>
    FORCEDENTRY: Sandbox Escape
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html</a>
    
  </li>

  <li>
    FBI forensics of the Bitfinex hack
    
    
      <br><a href="https://www.justice.gov/opa/press-release/file/1470211/download">https://www.justice.gov/opa/press-release/file/1470211/download</a>
    
  </li>

  <li>
    Wormhole Solana bridge incident
    
    
      <br><a href="https://rekt.news/wormhole-rekt/">https://rekt.news/wormhole-rekt/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2021 Q4</title>
    <id>https://slf.fish/mirror/21q4/</id>
    <link href="https://slf.fish/mirror/21q4/" />
    <updated>2021-12-24T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    How a simple Linux kernel memory corruption bug can lead to complete system compromise
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html">https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html</a>
    
  </li>

  <li>
    A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html</a>
    
  </li>

  <li>
    Titan M chip reverse engineering and bugs
    
    
      <br><a href="https://github.com/quarkslab/titanm">https://github.com/quarkslab/titanm</a>
    
  </li>

  <li>
    Alpha-Rays: key extraction attacks on threshold ECDSA implementations
    
    
      <br><a href="https://eprint.iacr.org/2021/1621.pdf">https://eprint.iacr.org/2021/1621.pdf</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2021 Q3</title>
    <id>https://slf.fish/mirror/21q3/</id>
    <link href="https://slf.fish/mirror/21q3/" />
    <updated>2021-09-29T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Frontrunning a scammer
    
    
      <br><a href="https://amanusk.medium.com/frontrunning-a-scammer-95f34dd33cf8">https://amanusk.medium.com/frontrunning-a-scammer-95f34dd33cf8</a>
    
  </li>

  <li>
    Sequoia: A deep root in Linux&amp;#x27;s filesystem layer (CVE-2021-33909)
    
    
      <br><a href="https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt">https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a>
    
  </li>

  <li>
    Downlevel Driver Enabler
    
    
      <br><a href="https://git.zx2c4.com/downlevel-driver-enabler/about/">https://git.zx2c4.com/downlevel-driver-enabler/about/</a>
    
  </li>

  <li>
    Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG
    
    
      <br><a href="https://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html">https://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html</a>
    
  </li>

  <li>
    Autodiscovering the Great Leak
    
    
      <br><a href="https://www.guardicore.com/labs/autodiscovering-the-great-leak/">https://www.guardicore.com/labs/autodiscovering-the-great-leak/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2021 Q2</title>
    <id>https://slf.fish/mirror/21q2/</id>
    <link href="https://slf.fish/mirror/21q2/" />
    <updated>2021-07-06T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    Send My
    
    
      <br><a href="https://github.com/positive-security/send-my">https://github.com/positive-security/send-my</a>
    
  </li>

  <li>
    ChromeOS root privilege escalation and android-root persistence
    
    
      <br><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1166932">https://bugs.chromium.org/p/chromium/issues/detail?id=1166932</a>
    
  </li>

  <li>
    Theodosius: JIT linker, mapper, obfuscator, and mutator
    
    
      <br><a href="https://githacks.org/_xeroxz/theodosius">https://githacks.org/_xeroxz/theodosius</a>
    
  </li>

  <li>
    Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
    
    
      <br><a href="https://eprint.iacr.org/2021/819">https://eprint.iacr.org/2021/819</a>
    
  </li>

  <li>
    GCP DHCP takeover code-exec
    
    
      <br><a href="https://github.com/irsl/gcp-dhcp-takeover-code-exec">https://github.com/irsl/gcp-dhcp-takeover-code-exec</a>
    
  </li>

  <li>
    An EPYC escape: Case-study of a KVM breakout
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html">https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html</a>
    
  </li>

</ul>]]></content>
  </entry>
  
  <entry>
    <title>SLF Digest 2021 Q1</title>
    <id>https://slf.fish/mirror/21q1/</id>
    <link href="https://slf.fish/mirror/21q1/" />
    <updated>2021-04-13T00:00:00Z</updated>
    <content type="html"><![CDATA[<ul>

  <li>
    sudo bug
    
    
      <br><a href="https://seclists.org/fulldisclosure/2021/Jan/79">https://seclists.org/fulldisclosure/2021/Jan/79</a>
    
  </li>

  <li>
    CVE-2021-1782 XNU kernel exploit
    
    <ul>
      <li>analysis: <a href="https://www.synacktiv.com/en/publications/analysis-and-exploitation-of-the-ios-kernel-vulnerability-cve-2021-1782.html">https://www.synacktiv.com/en/publications/analysis-and-exploitation-of-the-ios-kernel-vulnerability-cve-2021-1782.html</a></li>
      <li>PoC: <a href="https://github.com/ModernPwner/cicuta_virosa">https://github.com/ModernPwner/cicuta_virosa</a></li>
      </ul>
    
  </li>

  <li>
    Hunting for bugs in Windows mini filter
    
    
      <br><a href="https://googleprojectzero.blogspot.com/2021/01/hunting-for-bugs-in-windows-mini-filter.html">https://googleprojectzero.blogspot.com/2021/01/hunting-for-bugs-in-windows-mini-filter.html</a>
    
  </li>

  <li>
    One day short of a full chain
    
    <ul>
      <li>Part 1 — Android kernel arbitrary code execution: <a href="https://securitylab.github.com/research/one_day_short_of_a_fullchain_android">https://securitylab.github.com/research/one_day_short_of_a_fullchain_android</a></li>
      <li>Part 2 — Chrome sandbox escape: <a href="https://securitylab.github.com/research/one_day_short_of_a_fullchain_sbx">https://securitylab.github.com/research/one_day_short_of_a_fullchain_sbx</a></li>
      </ul>
    
  </li>

  <li>
    Quantifying blockchain extractable value: How dark is the forest?
    
    
      <br><a href="https://arxiv.org/pdf/2101.05511.pdf">https://arxiv.org/pdf/2101.05511.pdf</a>
    
  </li>

  <li>
    nft_ptr
    
    
      <br><a href="https://github.com/zhuowei/nft_ptr">https://github.com/zhuowei/nft_ptr</a>
    
  </li>

  <li>
    Remote exploitation of a man-in-the-disk vulnerability in WhatsApp (CVE-2021-24027)
    
    
      <br><a href="https://census-labs.com/news/2021/04/14/whatsapp-mitd-remote-exploitation-CVE-2021-24027/">https://census-labs.com/news/2021/04/14/whatsapp-mitd-remote-exploitation-CVE-2021-24027/</a>
    
  </li>

</ul>]]></content>
  </entry>
  
</feed>
