frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Easy RISC-V

https://dramforever.github.io/easyriscv/
185•todsacerdoti•6h ago•30 comments

10M people watched a YouTuber shim a lock; the lock company sued him – bad idea

https://arstechnica.com/tech-policy/2025/10/suing-a-popular-youtuber-who-shimmed-a-130-lock-what-...
885•Brajeshwar•14h ago•331 comments

Claude for Excel

https://www.claude.com/claude-for-excel
476•meetpateltech•11h ago•351 comments

Finding my rhythm again

https://jeremydaly.com/finding-my-rhythm-again/
46•qianli_cs•6d ago•2 comments

Iroh-blobs

https://www.iroh.computer/blog/iroh-blobs-0-95-new-features
55•janandonly•4h ago•9 comments

Simplify your code: Functional core, imperative shell

https://testing.googleblog.com/2025/10/simplify-your-code-functional-core.html
202•reqo•2d ago•74 comments

JetKVM – Control any computer remotely

https://jetkvm.com/
278•elashri•10h ago•147 comments

Yet another year with Decker

http://beyondloom.com/blog/unionstate3.html
42•RodgerTheGreat•1w ago•1 comments

Study finds growing social circles may fuel polarization

https://phys.org/news/2025-10-friends-division-social-circles-fuel.html
109•geox•8h ago•114 comments

Pyrex catalog from from 1938 with hand-drawn lab glassware [pdf]

https://exhibitdb.cmog.org/opacimages/Images/Pyrex/Rakow_1000132877.pdf
286•speckx•12h ago•64 comments

Why Busy Beaver hunters fear the Antihydra

https://benbrubaker.com/why-busy-beaver-hunters-fear-the-antihydra/
155•Bogdanp•10h ago•40 comments

Go beyond Goroutines: introducing the Reactive paradigm

https://samuelberthe.substack.com/p/go-beyond-goroutines-introducing
62•samber•1w ago•29 comments

Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files

https://seclists.org/oss-sec/2025/q4/79
28•JawsofDeath•4h ago•23 comments

MCP-Scanner – Scan MCP Servers for vulnerabilities

https://github.com/cisco-ai-defense/mcp-scanner
116•hsanthan•10h ago•34 comments

The new calculus of AI-based coding

https://blog.joemag.dev/2025/10/the-new-calculus-of-ai-based-coding.html
76•todsacerdoti•10h ago•68 comments

TOON – Token Oriented Object Notation

https://github.com/johannschopplich/toon
100•royosherove•1d ago•39 comments

Smartphones manipulate our emotions and trigger our reflexes

https://theconversation.com/smartphones-manipulate-our-emotions-and-trigger-our-reflexes-no-wonde...
112•PaulHoule•1d ago•52 comments

Should LLMs just treat text content as an image?

https://www.seangoedecke.com/text-tokens-as-image-tokens/
157•ingve•6d ago•94 comments

The last European train that travels by sea

https://www.bbc.com/travel/article/20251024-the-last-european-train-that-travels-by-sea
149•1659447091•18h ago•138 comments

Creating an all-weather driver

https://waymo.com/blog/2025/10/creating-an-all-weather-driver
64•boulos•8h ago•59 comments

Show HN: Dlog – Journaling and AI coach that learns what drives wellbeing (Mac)

https://dlog.pro/
30•dr-j•10h ago•12 comments

Show HN: JSON Query

https://jsonquerylang.org/
95•wofo•11h ago•57 comments

Solving regex crosswords with Z3

https://blog.nelhage.com/post/regex-crosswords-z3/
62•atilimcetin•6d ago•0 comments

Image Dithering: Eleven Algorithms and Source Code (2012)

https://tannerhelland.com/2012/12/28/dithering-eleven-algorithms-source-code.html
56•Bogdanp•3d ago•18 comments

Sieve (YC X25) is hiring engineers to build video datasets for frontier AI

https://www.sievedata.com/
1•mvoodarla•10h ago

When 'perfect' code fails

https://marma.dev/articles/2025/when-perfect-code-fails
52•vinhnx•13h ago•38 comments

AI can code, but it can't build software

https://bytesauna.com/post/coding-vs-software-engineering
142•nreece•3h ago•96 comments

Corrosion

https://fly.io/blog/corrosion/
187•cgb_•4d ago•91 comments

PSF has withdrawn $1.5M proposal to US Government grant program

https://pyfound.blogspot.com/2025/10/NSF-funding-statement.html
523•lumpa•12h ago•489 comments

Fnox, a secret manager that pairs well with mise

https://github.com/jdx/mise/discussions/6779
121•bpierre•11h ago•24 comments
Open in hackernews

Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files

https://seclists.org/oss-sec/2025/q4/79
28•JawsofDeath•4h ago

Comments

tptacek•3h ago
Why does it matter? I know the answer and this is a philosophical complaint, but the purpose of CVE is simply to make sure that people are talking about the same bug, not as a certification of importance or impact.

In this particular case, the poster is complaining that 3 CVEs were assigned for memory corruption vulnerabilities reachable only from the dnsmasq configuration file. I didn't read carefully, but the presumption that config file memory corruption bugs aren't vulnerabilities is problematic, because user input can find its way into configurations through templating; it depends on how innocuous the field triggering the bug is.

ekidd•3h ago
I suspect the big problem here is thinly-stretched volunteer maintainers.

I am very sympathetic to the idea that all memory corruption bugs should be fixed systematically, whether or not they're exploitable. It works well for OpenBSD. And, well, I wouldn't have leaned into Rust so early if I wasn't a bit fanatic about fixing memory corruption bugs.

But at the same time, a lot of maintainers are stretched really thin. And many pieces of software choose to trust some inputs, especially inputs that require root access to edit. If you want to take user input and use it to generate config files in /etc, you should plan to do extremely robust sanitization. Or to make donations to thinly-stretched volunteer maintainers, perhaps.

DiabloD3•3h ago
CVEs, however, do get scored according to CVSS, and they are often extremely hostile and live in fantasy land.

CVEs also cannot be denied by projects, and are often used as an avenue of harassment towards open source projects.

I agree with the poster on that mailing list, this is not, nor should be, a CVE. At no point can you edit those files without being root.

quacksilver•2h ago
Is that not a problem with how people are using CVEs, scoring them and attaching value to them rather than whether a CVE should be assigned itself. A CVE is simply a number and some data on a vulnerability so that the community knows they are all talking about the same issue

Even if you need to be root to edit the files, it still is a deviation from the design or reasonably expected behaviour of that interface, so is still a bug and should still get a CVE. It should either be fixed or failing that documented as 'wont fix' and on the radar of anyone building an application. Someone building the next plesk or cpanel or similar management system should at least know about filtering their input and not allowing it to get to the dangerous config file.

Re: Harassment - Can't the project release a statement saying that the bug writeup is low quality and unable to be reproduced? Anyone ignoring that without question and using it as evidence that the project is bad without proof is putting way too much value in CVEs and the fault is their own

TheDong•1h ago
> so is still a bug and should still get a CVE

It's a bug, sure. The V in CVE is for "vulnerability", which is why people treat CVEs as more than just bugs.

If every bug got a CVE, practically every commit would get one and they'd be even less useful than they are now.

At that point, why not just use commit hashes for CVEs and get rid of the system entirely if we're going to say every bug should get a CVE?

> Re: Harassment - Can't the project release a statement saying that the bug writeup is low quality and unable to be reproduced?

If your suggested response to a human DoS is "why can't the humans just do more work and write more difficult-to-word-correctly communication", then you're not understanding the problem.

tptacek•1h ago
But that's not what happened here. These are memory corruption bugs. Probably not meaningful ones, but in the subset of bugs that are generally considered vulnerabilities.
quacksilver•46m ago
If you are wasting time wording communication then are you doing it wrong?

I imagine the response would be looking at it briefly, seeing if it looks dangerous or reproducible and getting an AI to return a templated "PoC or GTFO" response.

The mere existence of a CVE doesn't tell anyone whether a bug is valid or not, and the security reports should be handled in the same way regardless of whether one does exist. For some odd reason people have attached value to having your name logged beside CVEs, despite it not telling you anything,

ajross•29m ago
> Is that not a problem with how people are using CVEs, scoring them and attaching value to them

Well, yes, it is. But if that's the way the market is going to game the scoring/value system it's (mis)using, then it behooves a project that wants to be successful to play the same game and push back when the scoring unfairly penalizes it.

Basically dnsmasq doesn't really have much of a choice here. Someone found a config parser bug and tried to make a big deal out of it, so someone else (which has to be dnsmasq or a defender) needs to explain why it's not a big deal.

BobbyTables2•12m ago
It gets blurry at times though.

Imagine a router has a web/cli interface for setting the DHCP server’s domain name. At some point the users’s data is forwarded to a process exiting the root-owned file.

Hypothetically, If a vulnerability in the parsing of such from the config could be exploited from the end-user, that would certainly matter.

And these things always seem to be one step away from bugs that allow arbitrary injection into the config file…

(I’m amazed at the hot messes exposed with HTTP and SMTP regarding difference in CR/CRLF/LF handling. Proxy servers and even “git” keep screwing this up…)

TheDong•2h ago
If someone can template in data, it's a lot easier to just set "dhcp-script=/arbitrary/code"

If the person templating isn't validating data, then it's already RCE to let someone template into this config file without careful validation.

... Also, this is a segfault, the chance anyone can get an RCE out of '*r = 0' for r being slightly out of bounds is close to nil, you'd need an actively malicious compiler.

While CVE's in theory are "just a number to coordinate with no real meaning", in practice a "Severity: High" CVE will trigger a bunch of work for people, so it's obviously not ideal to issue garbage ones.

tptacek•2h ago
Like I said, it depends on the configuration field. But people saying "you have to be root to change this configuration" are missing the point.

If the argument is "CVSS is a complete joke", I think basically every serious practitioner in the field agrees with that.

akerl_•2h ago
Maybe we should issue a CVE for company vulnerability response processes that blindly take CVSS scoring as input without evaluating the vulnerability.
TheDong•1h ago
> blindly take CVSS scoring as input without evaluating the vulnerability.

Evaluating the CVSS score in your own context is the work I'm talking about.

It does no one any good to have a CVE that says "may lead to remote code execution", when in fact it cannot, and if the reporter did more work, then you wouldn't need hundreds of people to independently do that work to determine this is garbage.

akerl_•1h ago
People being able to collectively analyze a vulnerability instead of having to all do it independently is pretty much the whole reason for having a CVE database, so I'm glad we agree.
tptacek•1h ago
I mean, I'm fine with the complaint about vulnerabilities that ambiguously refer to possible code execution, but that is a problem that long predates CVE.
rpcope1•1h ago
I've had to generate "bill of materials" for software I've shipped, and often certain end users will beat you over the head for "vulnerabilities" even if they're a low CVSS score or do not apply to your own code. I get the resistance to wanting CVEs for everything, as regardless of the initial intentions, there's a LOT of people/enterprises that just see "oh shit there's a CVE, the whole thing is garbage, we're not going to accept this/pay you/etc." Basically CVEs are often weaponized in a really counterproductive way.
BobbyTables2•17m ago
Ironically, software without a long list of CVEs is often the real hot garbage.

Some of it is surprisingly well known by name too!

jerrythegerbil•2h ago
Vulnerabilities can and often are chained together.

While the relevant configuration does require root to edit, that doesn’t mean that editing or inserting values to dnsmasq as an unprivileged user doesn’t exist as functionality in another application or system.

There are frivolous CVEs issued without any evidence of exploitability all the time. This particular example however, isn’t that. These are pretty clearly qualified as CVEs.

The implied risk is a different story, but if you’re familiar with the industry you’ll quickly learn that there are people with far more imagination and capacity to exploit conditions you believe aren’t practically exploitable, particularly in highly available tools such as dnsmasq. You don’t make assumptions about that. You publish the CVE.

landr0id•2h ago
>that doesn’t mean that editing or inserting values to dnsmasq as an unprivileged user doesn’t exist as functionality in another application or system.

The developer typically defines its threat model. My threat model would not include another application inserting garbage values into my application's config, which is expected to be configured by a root (trusted) user.

The Windows threat model does not include malicious hardware with DMA tampering with kernel memory _except_ maybe under very specific configurations.

jerrythegerbil•2h ago
> The developer typically defines its threat model.

The people running the software define the threat model.

And CNA’s issue CVEs because the developer isn’t the only one running their software, and it’s socially dangerous to allow that level of control of the narrative as it relates to security.

akerl_•2h ago
> The developer typically defines its threat model.

Is this the case? As we're seeing here, getting a CVE assigned does not require input or agreement from the developer. This isn't a bug bounty where the developer sets a scope and evaluates reports. It's a common database across all technology for assigning unique IDs to security risks.

The developer puts their software into the world, but how the software is used in the world defines what risks exist.

BobbyTables2•7m ago
The developer is too stupid to define the threat model — they’re too busy writing vulnerabilities as they cobble together applications and libraries they barely understand.

How many wireless routers generate a config from user data plus a template. One’s lucky if they even do server side validation that ensures CRLFs not present in IP addresses and hostnames.

And if Unicode is involved … a suitcase of four leaf clovers won’t save you.

Kiboneu•2h ago
Several issues seem to be getting mixed up.

The first issue being raised is that replacing the configuration file shouldn't count as a vulnerability. Usually I'd agree, but the fact that it causes memory corruption from user input warrants at least a low severity report.

If we can't prove that a vulnerability is exploitable, we have to keep our assumptions minimal. If the memory corruption vuln is provably unexploitable, a future code change could surface it as a plausible exploit primitive. It can also point to a section of code that may have been under-speced, and may serve as an signal to pay more attention at these sections for related bugs. Also, it doesn't seem right to assume that the config files will always be under a privileged directory.

The second issue being discussed iun the mailing list is that it's LLM slop. While the reports do seem to be AI generated, I haven't seen any response about the PoC failing, but maybe there is a significant problem where a lot of PoCs are fake.

So many assumptions. As commander Data may have said today, "the most elementary and valuable statement in security, the beginning of wisdom, is 'I do not know.'"