poisoned NUL
2014-08-26 19:55:32.327286+02 by
Dan Lyke
0 comments
Google Project Zero: The poisoned NUL byte, 2014 edition. Fascinating account of figuring out how to exploit an off-by-one error in glibc's memory allocation code into privilege escalation. Good things to think about for any coder, especially anyone working in C or C++, but also in how we think about building larger systems.
[ related topics:
Software Engineering Work, productivity and environment
]
comments in ascending chronological order (reverse):
Comment policy
We will not edit your comments. However, we may delete your
comments, or cause them to be hidden behind another link, if we feel
they detract from the conversation. Commercial plugs are fine,
if they are relevant to the conversation, and if you don't
try to pretend to be a consumer. Annoying endorsements will be deleted
if you're lucky, if you're not a whole bunch of people smarter and
more articulate than you will ridicule you, and we will leave
such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.