Aggregator
CVE-2025-68211 | Linux Kernel up to 6.12.58/6.17.8 ksm scan_get_next_rmap_item deadlock (EUVD-2025-203685 / Nessus ID 298404)
CVE-2025-68214 | Linux Kernel up to 6.1.158/6.6.117/6.12.59/6.17.9 timers timer_shutdown_sync race condition (Nessus ID 282382 / WID-SEC-2025-2868)
CVE-2025-40149 | Linux Kernel up to 6.17.2 __sk_dst_get use after free (EUVD-2025-124934 / Nessus ID 279063)
CVE-2025-40164 | Linux Kernel up to 6.17.4/6.18-rc1 usbnet smp_processor_id stack-based overflow (Nessus ID 275226 / WID-SEC-2025-2579)
CVE-2025-40251 | Linux Kernel up to 6.6.117/6.12.59/6.17.9 new_device devl_rate_nodes_destroy reference count (Nessus ID 277523 / WID-SEC-2025-2747)
CVE-2025-40090 | Linux Kernel up to 6.12.54/6.17.4/6.18-rc1 ksmbd_session_rpc_method race condition (Nessus ID 272092 / WID-SEC-2025-2450)
CVE-2025-40039 | Linux Kernel up to 6.12.52/6.17.2 ksmbd_session_rpc_open use after free (Nessus ID 271914 / WID-SEC-2025-2431)
CVE-2025-40040 | Linux Kernel up to 6.6.113/6.12.54/6.17.2 ksm userfaultfd_release_all denial of service (EUVD-2025-36488 / Nessus ID 271902)
CVE-2025-40082 | Linux Kernel up to 6.17.2 hfsplus_uni2asc out-of-bounds (Nessus ID 271867 / WID-SEC-2025-2431)
【工具】PrivacyCheckGo:完善规则引擎
Aeternum Botnet Shifts Command Control to Polygon Blockchain
NDSS 2025 – Translating C To Rust: Lessons From A User Study
Session 13D: Software Security: Code and Compiler
Authors, Creators & Presenters: Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li (National University of Singapore), Prateek Saxena (National University of Singapore), Ashish Kundu (Cisco Research)
PAPER
Translating C To Rust: Lessons From A User Study
Rust aims to offer full memory safety for programs, a guarantee that untamed C programs do not enjoy. How difficult is it to translate existing C code to Rust? To get a complementary view from that of automatic C to Rust translators, we report on a user study asking humans to translate real-world C programs to Rust. Our participants are able to produce safe Rust translations, whereas state-of-the-art automatic tools are not able to do so. Our analysis highlights that the high-level strategy taken by users departs significantly from those of automatic tools we study. We also find that users often choose zero-cost (static) abstractions for temporal safety, which addresses a predominant component of runtime costs in other full memory safety defenses. User-provided translations showcase a rich landscape of specialized strategies to translate the same C program in different ways to safe Rust, which future automatic translators can consider.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Translating C To Rust: Lessons From A User Study appeared first on Security Boulevard.
SecWiki News 2026-02-26 Review
更多最新文章,请访问SecWiki
AI时代的EICAR病毒:用魔术字符串瘫痪Claude的攻防实验
Ваш телефон внезапно начал обновляться? Это может быть вирус Oblivion, захватывающий контроль над системой
ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices
A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to the mobile devices of journalists and civil society members. First publicly reported in December 2025 through a joint investigation by Reporters Without Borders (RSF) and RESIDENT.NGO, the malware’s code history suggests it was quietly developed […]
The post ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices appeared first on Cyber Security News.
MindsDB BYOM 远程代码执行漏洞挖掘
Insomnia
You must login to view this content