Kev
@kevinbackhouse.bsky.social
📤 5
📥 6
📝 0
reposted by
Kev
GitHub Security Lab
5 months ago
Georg Semmler, the maintainer of
github.com/diesel-rs/di...
and one of the recent participants in the GitHub Secure Open Source Fund, has written a tool called cargo-safe-publish that helps protect against supply chain attacks in the Rust Cargo ecosystem. Read more:
blog.weiznich.de/blog/cargo-s...
loading . . .
Introducing cargo safe-publish
About ways to publish unexpected code to crates.io
https://blog.weiznich.de/blog/cargo-safe-publish/
0
2
1
reposted by
Kev
Ryan O'Horo
5 months ago
VXUG dropped the news that a DEFCON talk was AI generated nonsense and so was the code put on github for it. Some attendees noticed it was off, but this talk was presented, passed review. The github issues are rolling in.
7
25
17
reposted by
Kev
GitHub Security Lab
7 months ago
New vuln from the GitHub Security Lab 🔍 Antonio + Kev team up to uncover CVE-2025-53367 — an out-of-bounds write in DjVuLibre that could lead to code execution on Linux desktops. Found via fuzzing. 🧠 Read the announcement:
github.blog/security/vul...
loading . . .
CVE-2025-53367: An exploitable out-of-bounds write in DjVuLibre
DjVuLibre has a vulnerability that could enable an attacker to gain code execution on a Linux Desktop system when the user tries to open a crafted document.
https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre/
0
4
1
reposted by
Kev
GitHub Security Lab
8 months ago
Our team member Man Yue Mo is back, showing a new way to bypass MTE protection on Android phones with CVE-2025-0072.
github.blog/security/vul...
loading . . .
Bypassing MTE with CVE-2025-0072
See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
0
6
3
reposted by
Kev
Peter Stöckli
11 months ago
In this demonstration I show the impact of CVE-2025-25291/CVE-2025-25292, an authentication bypass in ruby-saml used by high profile OSS projects such as GitLab. My team coordinated with both the ruby-saml maintainer and GitLab to get this vulnerability fixed and patches are available at
gh.io/glfx
loading . . .
1
22
3
reposted by
Kev
Peter Stöckli
11 months ago
If you're using ruby-saml or omniauth-saml for SAML authentication make sure to update these libraries as fast as possible! Fixes for two critical authentication bypass vulnerabilities were published today (CVE-2025-25291 + CVE-2025-25292).
github.blog/security/sig...
loading . . .
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
1
11
10
reposted by
Kev
GitHub Security Lab
11 months ago
In this blog post, we detail newly discovered authentication bypass vulnerabilities in the ruby-saml library used for single sign-on (SSO) via SAML on the service provider (application) side.
github.blog/security/sig...
loading . . .
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
0
7
6
reposted by
Kev
Michael Stepankin
about 1 year ago
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more!
github.blog/security/vul...
1
28
16
you reached the end!!
feeds!
log in