Day[0] cover image

[binary] Edge Vulns, a SHA-3 Overflow, and an io_uring Exploit

Day[0]

00:00

Is It a Timer FD Context?

It's also just rough to work with anyhow. Because of the fact that freeze that you don't get to hold the memory in place for very long. So he went a different direction, which is basically getting the victim object allocated into the invalid slot and then using the valid upper and lower slots to perform the right. It talks a bit about keep grooming strategies, which was neat, but I'll mostly skip over here. Mostly was novel. There is just like, pointing the terminology for bread. I think he calls them like digging and fencing strategies. Yeah.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app