lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9d3a8f6c-0d03-4e66-9b55-ac254dc59ed3@x9p.org>
Date: Fri, 3 Oct 2025 12:42:14 -0300
From: full@....org
To: josephgoyd <josephgoyd@...ton.me>,
 "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: Re: [FD]
 Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain → Secure Enclave Key Theft, Wormable RCE, Crypto Theft

Substack is down. If there is a replacement, it is appreciated.

-x9p

On 6/9/25 2:22 AM, josephgoyd via Fulldisclosure wrote:
> CVE-2025-31201 — Kernel escalation via malformed AMPDU metadata (PAC bypass)
>
> Write-Up and Artifacts:
> https://weareapartyof1.substack.com/p/the-crypto-heist-apple-kept-quiet

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ