frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Elon Musk Challenges Wikipedia with His Own A.I. Encyclopedia

https://www.nytimes.com/2025/10/27/technology/grokipedia-launch-elon-musk.html
1•reaperducer•43s ago•0 comments

CMMC Compliance Application

https://cmmc.jaktool.com
1•jellyfiz•5m ago•1 comments

A Few Comments on 'Age'

https://neilmadden.blog/2019/12/30/a-few-comments-on-age/
1•upofadown•6m ago•1 comments

Qualcomm announces AI chips to compete with AMD and Nvidia

https://www.cnbc.com/2025/10/27/qualcomm-ai200-ai250-ai-chips-nvidia-amd.html
1•mgh2•6m ago•0 comments

AlphaFlow: Understanding and Improving MeanFlow Models

https://github.com/snap-research/alphaflow
1•dvrp•7m ago•0 comments

Clang-Doc

https://clang.llvm.org/extra/clang-doc.html
1•frabert•9m ago•0 comments

Ask HN: Recent Eye-Opening Experiences

1•bhag2066•9m ago•0 comments

JPMorgan offers staff AI chatbot to help write performance reviews

https://www.ft.com/content/84308936-e277-4ae0-b384-502d60375456
2•cebert•10m ago•2 comments

Amazon May Cut 30k White-Collar Jobs, Starting Tomorrow

https://www.cnn.com/2025/10/27/business/amazon-corporate-layoffs
2•ChrisMarshallNY•10m ago•1 comments

Show HN: Recipe Converter – Instantly Adapt Recipes to Your Diet

https://chromewebstore.google.com/detail/recipe-converter-–-quick/pioagjmbjdhebcnimglgiemfkobcf...
1•aidan-ricci•13m ago•0 comments

Hurricane Melissa is now the strongest storm on the planet this year

https://www.cnn.com/weather/live-news/hurricane-melissa-jamaica-landfall-monday-climate
2•kaycebasques•14m ago•1 comments

Show HN: Gosim Distributed Systems Testing Framework Written in Go

https://github.com/jellevandenhooff/gosim
1•dschofie•14m ago•0 comments

Dear American Jews

https://twitter.com/SilentlySirs/status/1982859569639588182
1•nakamoto_damacy•19m ago•0 comments

Dutch took over Nexperia – fears was dismantling operations and moving to China

https://www.reuters.com/sustainability/boards-policy-regulation/dutch-government-took-control-nex...
1•zerosizedweasle•22m ago•1 comments

Extreme-temperature single-particle heat engine

https://arxiv.org/abs/2501.03677
1•PaulHoule•24m ago•0 comments

Index of /Ufocollect/UFO

http://cd.textfiles.com/ufocollect/UFO/
2•mindcrime•24m ago•0 comments

Pass-by-Value Overhead

https://owen.cafe/posts/struct-sizes/
2•todsacerdoti•25m ago•0 comments

Novo Nordisk fights to keep Medicaid paying for weight-loss drugs

https://www.reuters.com/legal/litigation/novo-nordisk-fights-keep-medicaid-paying-weight-loss-dru...
2•paulpauper•27m ago•1 comments

There's a Lesson to Learn from Daniel Kahneman's Death

https://www.nytimes.com/2025/04/14/opinion/daniel-kahneman-death-suicide.html
2•paulpauper•28m ago•1 comments

Vercel CEO defends his involvement with Netanyahu [video]

https://www.youtube.com/watch?v=jy6qY-fEAjA
2•Mon0t0n•31m ago•1 comments

Your Vibe coded slop PR is not welcome

https://samsaffron.com/archive/2025/10/27/your-vibe-coded-slop-pr-is-not-welcome
2•sams99•34m ago•0 comments

The 'Womanosphere' Is Reshaping the Conservative Dating Landscape

https://www.wired.com/story/the-womanosphere-is-reshaping-the-conservative-dating-landscape/
1•1659447091•36m ago•0 comments

Emulsiv: A visual simulator for teaching computer architecture using RISC-V

https://github.com/ESEO-Tech/emulsiV
1•signa11•39m ago•0 comments

Built pokersettler.club to settle and track poker games at home

https://pokersettler.club/
1•apswin•40m ago•1 comments

Ask HN: What are you doing this week?

2•SafeDusk•42m ago•4 comments

More Than DNS: The 14 hour AWS us-east-1 outage

https://thundergolfer.com/blog/aws-us-east-1-outage-oct20
2•Bogdanp•48m ago•1 comments

Handwriting Programs in J

https://www.hillelwayne.com/handwriting-j/
3•Bogdanp•48m ago•3 comments

Employee Profiles of Remote Work Benefits in a Medium Italian IT Company

https://www.mdpi.com/2076-3387/15/11/414
1•spyrobaby•55m ago•0 comments

MiniMax M2: open model for agents and code

https://www.minimaxi.com/news/minimax-m2
1•mustaphah•56m ago•0 comments

Sports mafia ties run deeper than NBA gambling scandal

https://www.espn.com/nba/story/_/id/46732224/billups-jones-rozier-nba-gambling-scandal-mafia-ties...
2•1659447091•59m ago•0 comments
Open in hackernews

Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files

https://seclists.org/oss-sec/2025/q4/79
15•JawsofDeath•2h ago

Comments

tptacek•1h ago
Why does it matter? I know the answer and this is a philosophical complaint, but the purpose of CVE is simply to make sure that people are talking about the same bug, not as a certification of importance or impact.

In this particular case, the poster is complaining that 3 CVEs were assigned for memory corruption vulnerabilities reachable only from the dnsmasq configuration file. I didn't read carefully, but the presumption that config file memory corruption bugs aren't vulnerabilities is problematic, because user input can find its way into configurations through templating; it depends on how innocuous the field triggering the bug is.

ekidd•52m ago
I suspect the big problem here is thinly-stretched volunteer maintainers.

I am very sympathetic to the idea that all memory corruption bugs should be fixed systematically, whether or not they're exploitable. It works well for OpenBSD. And, well, I wouldn't have leaned into Rust so early if I wasn't a bit fanatic about fixing memory corruption bugs.

But at the same time, a lot of maintainers are stretched really thin. And many pieces of software choose to trust some inputs, especially inputs that require root access to edit. If you want to take user input and use it to generate config files in /etc, you should plan to do extremely robust sanitization. Or to make donations to thinly-stretched volunteer maintainers, perhaps.

DiabloD3•49m ago
CVEs, however, do get scored according to CVSS, and they are often extremely hostile and live in fantasy land.

CVEs also cannot be denied by projects, and are often used as an avenue of harassment towards open source projects.

I agree with the poster on that mailing list, this is not, nor should be, a CVE. At no point can you edit those files without being root.

TheDong•41m ago
If someone can template in data, it's a lot easier to just set "dhcp-script=/arbitrary/code"

If the person templating isn't validating data, then it's already RCE to let someone template into this config file without careful validation.

... Also, this is a segfault, the chance anyone can get an RCE out of '*r = 0' for r being slightly out of bounds is close to nil, you'd need an actively malicious compiler.

While CVE's in theory are "just a number to coordinate with no real meaning", in practice a "Severity: High" CVE will trigger a bunch of work for people, so it's obviously not ideal to issue garbage ones.

tptacek•25m ago
Like I said, it depends on the configuration field. But people saying "you have to be root to change this configuration" are missing the point.

If the argument is "CVSS is a complete joke", I think basically every serious practitioner in the field agrees with that.

akerl_•13m ago
Maybe we should issue a CVE for company vulnerability response processes that blindly take CVSS scoring as input without evaluating the vulnerability.
jerrythegerbil•14m ago
Vulnerabilities can and often are chained together.

While the relevant configuration does require root to edit, that doesn’t mean that editing or inserting values to dnsmasq as an unprivileged user doesn’t exist as functionality in another application or system.

There are frivolous CVEs issued without any evidence of exploitability all the time. This particular example however, isn’t that. These are pretty clearly qualified as CVEs.

The implied risk is a different story, but if you’re familiar with the industry you’ll quickly learn that there are people with far more imagination and capacity to exploit conditions you believe aren’t practically exploitable, particularly in highly available tools such as dnsmasq. You don’t make assumptions about that. You publish the CVE.

landr0id•9m ago
>that doesn’t mean that editing or inserting values to dnsmasq as an unprivileged user doesn’t exist as functionality in another application or system.

The developer typically defines its threat model. My threat model would not include another application inserting garbage values into my application's config, which is expected to be configured by a root (trusted) user.

The Windows threat model does not include malicious hardware with DMA tampering with kernel memory _except_ maybe under very specific configurations.

jerrythegerbil•2m ago
> The developer typically defines its threat model.

The people running the software define the threat model.

And CNA’s issue CVEs because the developer isn’t the only one running their software, and it’s socially dangerous to allow that level of control of the narrative as it relates to security.

Kiboneu•9m ago
Several issues seem to be getting mixed up.

The first issue being raised is that replacing the configuration file shouldn't count as a vulnerability. Usually I'd agree, but the fact that it causes memory corruption from user input warrants at least a low severity report.

If we can't prove that a vulnerability is exploitable, we have to keep our assumptions minimal. If the memory corruption vuln is provably unexploitable, a future code change could surface it as a plausible exploit primitive. It can also point to a section of code that may have been under-speced, and may serve as an signal to pay more attention at these sections for related bugs. Also, it doesn't seem right to assume that the config files will always be under a privileged directory.

The second issue being discussed iun the mailing list is that it's LLM slop. While the reports do seem to be AI generated, I haven't seen any response about the PoC failing, but maybe there is a significant problem where a lot of PoCs are fake.

So many assumptions. As commander Data may have said today, "the most elementary and valuable statement in security, the beginning of wisdom, is 'I do not know.'"