frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Mechanical Watch: Exploded View

https://fellerts.no/projects/epoch.html
908•fellerts•19h ago•101 comments

New Linux udisks flaw lets attackers get root on major Linux distros

https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/
105•smig0•3d ago•46 comments

I wrote my PhD Thesis in Typst

https://fransskarman.com/phd_thesis_in_typst.html
344•todsacerdoti•13h ago•204 comments

Python can run Mojo now

https://koaning.io/posts/giving-mojo-a-spin/
170•cantdutchthis•2d ago•84 comments

Using Home Assistant, adguard home and an $8 smart outlet to avoid brain rot

https://www.romanklasen.com/blog/beating-brainrot-by-button/
232•remuskaos•13h ago•120 comments

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

https://codeberg.org/CipherNomad/Ariadne
27•ciphernomad-org•6h ago•23 comments

Spectroscopic Classification of ASASSN-25cm as a Classical Nova

https://www.astronomerstelegram.org/?read=17228
14•tzury•3h ago•4 comments

Finding a billion factorials in 60 ms with SIMD

https://codeforces.com/blog/entry/143279
117•todsacerdoti•11h ago•9 comments

Polystate: Composable Finite State Machines

https://github.com/sdzx-1/polystate
62•goless•8h ago•29 comments

Klein Bottle Amazon Brand Hijacking (2021)

https://www.kleinbottle.com/Amazon_Brand_Hijacking.html
235•sebg•14h ago•103 comments

EU rules for durable, energy-efficient and repairable smartphones and tablets

https://single-market-economy.ec.europa.eu/news/new-eu-rules-durable-energy-efficient-and-repairable-smartphones-and-tablets-start-applying-2025-06-20_en
15•robin_reala•1h ago•14 comments

Show HN: Lego Island Playable in the Browser

https://isle.pizza
94•foxtacles•11h ago•24 comments

The Tandy Corporation

https://www.abortretry.fail/p/the-tandy-corporation-part-1
34•rbanffy•2d ago•16 comments

Verlet Integration and Cloth Physics Simulation

https://pikuma.com/blog/verlet-integration-2d-cloth-physics-simulation
10•atan2•2d ago•2 comments

The X Window System didn't immediately have X terminals

https://utcc.utoronto.ca/~cks/space/blog/unix/XTerminalsNotImmediate
38•zdw•6h ago•15 comments

Tensor Manipulation Unit (TMU): Reconfigurable, Near-Memory, High-Throughput AI

https://arxiv.org/abs/2506.14364
36•transpute•8h ago•5 comments

Using Wave Function Collapse to solve puzzle map generation at scale

https://sublevelgames.github.io/blogs/2025-06-22-nurikabe-map-gen-with-wfc/
46•greentec•9h ago•12 comments

Disabling Intel Graphics Security Mitigation Boosts GPU Compute Performance 20%

https://www.phoronix.com/news/Disable-Intel-Gfx-Security-20p
35•rcarmo•3h ago•8 comments

Radio Garden

https://radio.garden/?2025
99•LeoPanthera•12h ago•18 comments

Claude Code for VSCode

https://marketplace.visualstudio.com/items?itemName=anthropic.claude-code
17•tosh•2h ago•7 comments

Optifye.ai (YC W25) – Founding Back End Engineer

1•Vivaan_Baid•9h ago

Hawaii Highways

http://www.hawaiihighways.com/
56•yakattak•11h ago•20 comments

Cross-Account and Cross-Region Backups with AWS Backup (and Friends)

https://tylerrussell.dev/2025/06/20/cross-account-and-region-backups-with-aws-backup-and-friends/
35•terussell85•2d ago•11 comments

2048 with only 64 bits of state

https://github.com/izabera/bitwise-challenge-2048
139•todsacerdoti•3d ago•34 comments

The cultural decline of literary fiction

https://oyyy.substack.com/p/the-cultural-decline-of-literary
168•libraryofbabel•18h ago•296 comments

2025 Alonzo Church Award: Paul Blain Levy for Call-by-Push-Value (CBPV)

https://siglog.org/winner-of-the-2025-alonzo-church-award/
35•matt_d•2d ago•6 comments

The largest map of the universe reveals over 800k galaxies

https://newatlas.com/space/largest-map-universe-reveals-800000-galaxies/
3•thunderbong•34m ago•0 comments

Interview with Francine Prose on early-1970s San Francisco [audio]

https://www.laphamsquarterly.org/content/episode-3-francine-prose
52•keiferski•14h ago•8 comments

We’ve had a Denisovan skull since the 1930s, only nobody knew

https://arstechnica.com/science/2025/06/the-controversial-dragon-man-skull-was-a-denisovan/
84•Bluestein•4d ago•26 comments

Adobe Project Indigo is a new photo app from former Pixel camera engineers

https://www.engadget.com/apps/adobe-project-indigo-is-a-new-photo-app-from-former-pixel-camera-engineers-213453207.html
71•bookofjoe•2d ago•55 comments
Open in hackernews

New Linux udisks flaw lets attackers get root on major Linux distros

https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/
103•smig0•3d ago

Comments

hbogert•2h ago
As someone who has been using linux quite happily on the desktop for more than 20 years now, I have to say it remains an eternal experiment, feature wise as well as security wise.
stavros•2h ago
If you think Linux is an experiment, you should see the other OSes.
khurs•2h ago
Including Openbsd?
ahofmann•2h ago
I'm pretty sure, that the BSD family is pretty mature and secure. Linux is just good enough for most people.
charcircuit•58m ago
>is pretty mature and secure

They are still missing something like capability based security like iOS and Android have where apps have to be granted access to use things like files or the camera. It may have been considered secure a couple decades ago, but they have fallen behind the competiton.

NexRebular•37m ago
> They are still missing something like capability based security

...like Capsicum?

https://wiki.freebsd.org/Capsicum

charcircuit•20m ago
No, that requires explicit changes by programs to use meaning that malware can ignore it and steal your browser's cookies and take secret photos with your webcam.
8fingerlouie•33m ago
You can use Jails and limit access to hardware resources for each jail. Still not as dynamic, but will get the job done.
charcircuit•19m ago
Sure, but this is not done automatically for the user.
wahern•29m ago
FreeBSD literally has Capsicum: https://en.wikipedia.org/wiki/Capsicum_(Unix) That might be the most pure capability system out of all of them, though it's not something that works without application modification (yet). Android and iOS applications can automatically work with the native capability framework because they rely on higher-level SDK APIs. But AFAIU those capability systems are very coarse-grained, in the sense that it's difficult leverage the capability system internally within a single application. And keeping lower-level APIs (e.g. for C and POSIX filesystem I/O) nominally working (if at all) requires some impure hacks. All of which makes them very similar to FreeBSD Jails or Linux containers in that respect.

I wouldn't consider any of these systems "secure", though, as a practical matter. In terms of preventing a breakout, I'd trust an application on OpenBSD with strict pledge and unveil limits, or a Linux process in a classic seccomp sandbox (i.e. only read, write, and exit syscalls), more than any of those other systems. Maybe Capsicum, too, but I'm not familiar enough with the implementation to know how well it limits kernel code surface area. But any application that can poke at (directly or indirectly) complicated hardware, like the GPU, is highly problematic unless there are proofs of correctness for any series of inputs that can be sent by the process (which I don't think is the case).

8fingerlouie•35m ago
A big part of the difference is that the BSDs are designed by a governing committee. They usually don't have 15 different solutions for the same problem, but instead 2-3 solutions that work well.

Take filesystems, the official filesystems are UFS(1/2) and ZFS (and i think UFS is deprecated). They have GEOM as LVM and LUKS and more.

That being said, the majority of money and development goes into Linux, which by itself may make it a better system (eventually)

assimpleaspossi•27m ago
UFS is not deprecated on FreeBSD.
hxorr•13m ago
I believe it is the default on netBSD
graemep•25m ago
> A big part of the difference is that the BSDs are designed by a governing committee. They usually don't have 15 different solutions for the same problem, but instead 2-3 solutions that work well.

The right comparison is not between a particular BSD and Linux, its between a particular BSD and a Linux distro.

jeltz•7m ago
I feel the BSDs are much more different from each other than the average Linux distros are.
pandemic_region•2h ago
> I have to say it remains an eternal experiment

You just defined 'life' in general.

subscribed•2h ago
That's certainly an interesting standpoint.

I use both privately and professionally and while I accept that security-wise (even with selinux) they feel lacking, feature-wise they far exceed Windows I use as my other is except in gaming experience.

I wish I had something like GrapheneOS on desktops (yes I know about Qubes)

throawayonthe•2h ago
same! qubes is probably the actual solution for now, but i've seen some grapheneos people work on https://secureblue.dev/ and that seems a lot more "normal"
IlikeKitties•2h ago
> I wish I had something like GrapheneOS on desktops (yes I know about Qubes)

SecureBlue and Kicksecure are the closest equivalents.

3abiton•45m ago
What's their selling point compared ro Qubes?
udev4096•1h ago
Qubes is definitely hard to daily drive. With it's ancient default XFCE design, it looks really ugly. Plus no hardware acceleration
lima•21m ago
Chromium OS gets very close, they also have fully-functional VM-based isolation for Linux applications with GPU acceleration.

Unfortunately, there's no popular non-Google distro of it.

sneak•2h ago
Local root privilege escalation is mostly irrelevant these days. It’s only useful as part of an exploit chain, really. It’s not like shell servers are still around.
magicalhippo•2h ago
An exploit chain, like combining it with the PAM issue they mentioned in the very same article, affecting Fedora.
TheDong•2h ago
The article was about two issues that combine to make a single local-privilege-escalation, so the PAM thing isn't a separate exploit chain, it's just part of getting local root in this vulnerability.

What the parent poster meant is that you first need a way to run arbitrary code before local privilege escalation matters, so the exploit chain has to include _something_ that gets you local code execution.

I tend to agree with the parent poster, for most modern single-user linux devices, local privilege escalation means almost nothing.

Like, I'm the only user on my laptop. If you get arbitrary code execution as my user, you can log my keystrokes, steal my passwords and browser sessions, steal my bitcoin wallet, and persist reasonably well.... and once you've stolen my password via say keylogging me typing `sudo`, you now have root too.

If you have a local privilege escalation too, you still get my passwords, bitcoin wallet, etc, and also uh... you can persist yourself better by injecting malware into sshd or something or modifying my package manager? idk, seems like it's about the same.

simoncion•1h ago
> ...for most modern single-user linux devices, local privilege escalation means almost nothing.

I haven't actually looked at the numbers, but I strongly suspect that it's true that the overwhelming majority of single-user Linux devices out there are Android devices. If that's true, then it's my understanding that Android does bother to fairly properly sandbox programs from each other... so an escalation to root would actually be a significant gain in access.

DaSHacka•1h ago
Does Android use Udisks? I assumed it did not, due to the difference in architecture over most traditional GNU/Linux desktop systems
simoncion•1h ago
I have no idea if Android uses udisks. It has been something like a decade since I last looked at 'ps' output on an Android machine, so any information on the topic I might have had has faded away with time.
worthless-trash•1h ago
Some services dont run as the same user logging into the laptop.
worthless-trash•1h ago
An attacker doesn't need a shell server to run code locally, you chain it with an exploit to a service and you have root and now have lateral attack capabilities.
devnullbrain•1h ago
>20 years ago

So while Windows was letting everyone be root?

amelius•1h ago
What especially feels like an experiment is container technology.
coderatlarge•1h ago
how much harder is container escaping compared to vm escaping? i understand that containers are not truly meant to be security boundaries but they are often thought of and even used as such.
fc417fc802•1h ago
> how much harder is container escaping compared to vm escaping?

The answer heavily depends on your configuration. Unprivileged with a spartan syscall filter and a security profile is very different than privileged with the GPU bindmounted in (the latter amounts to a chroot and a separate user account).

tetha•53m ago
Hence if I ever get money for an infrastructure pentest, I want to include a scenario that scares me a bit: The hijacked application server. The pentesters give me a container with whatever tooling they want and a reverse shell and that gets deployed in the dev-infrastructure, once privileged and once unprivileged, both with a few secrets an application server would have. I'd just reuse a deployment config from some job. And then have at it.

And yes, this will most likely be a mess.

franga2000•1h ago
Re:"Eternal experiment"... have you seen Windows 11? Or even 10? The devs can't keep their hands off of the thing, changing, breaking and fixing every component every few months.
yusina•1h ago
Software is rarely "done", so is quite naturally always an evolving experiment of sorts.
jpnc•12m ago
That goes for all (active) software really. Otherwise people call it obsolete or abandoned.
0points•7m ago
We're talking about a local privilege escalation here.

That assumes:

1) Attacker already have an account on the system

2) The app `udisks` is installed on the system.

Everyone is fighting the same battle and it's a good thing. It is happening because the rest of the system is hard enough to attack these days. This is true for all major OS:es.

Only fanboys bend reality to make this into a good-vs-bad argument.

teddyh•2h ago
Fixed two weeks ago (in Debian at least).
simoncion•2h ago
Yup. And it was never a problem in Gentoo.
udev4096•1h ago
It's pretty old and only affects openSUSE, the title is extremely misleading
aspenmayer•1h ago
> The Qualys Threat Research Unit (TRU), which discovered and reported both flaws, has also developed proof-of-concept exploits and successfully targeted CVE-2025-6019 to get root privileges on Ubuntu, Debian, Fedora, and openSUSE Leap 15 systems.

https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt

charcircuit•55m ago
Another case of suid causing LPE. When will distros learn that suid needs to be removed or disabled if they want security?