A call to memcpy() in a single binary that uses glibc may behave in 12 different ways depending on the features of the specific x86-64 CPU you run it on.
Here is a list of those impls in glibc:
Fwiw this may matter a lot during binary exploitation. This was important in a challenge from PlaidCTF 2025. E.g. passing a negative (or: very huge) length allowed you to write past a buffer without a crash (the given implementation was not doing a wild copy).
Hardening the Firefox Frontend with Content Security Policies
https://attackanddefense.dev/2025/04/09/hardening-the-firefox-frontend-with-content-security-policies.html
Here’s the #Ghidriff output for CLFS.sys 10.0.20348.3328 vs. 10.0.20348.3453, likely corresponding to the CVE-2025-29824 use-after-free LPE:
https://gist.github.com/v-p-b/8c43fb8e0d72814dcd03764d478622ce
Oh is it time for another Fortinet crit again? Unauthenticated admin password change in FortiSwitch.
CVE-2024-48887, CVSSv3 9.3
@HalvarFlake one for you: Skyper / TESO on Where Warlocks Stay Up Late - Episode 4 "Eduart Steiner aka Skyper" https://www.youtube.com/watch?v=sQVLniT9CDY
“Seniors also recognize that understanding problems isn’t just coming up with an algorithm. It’s understanding who wants the problem solved, why they want it solved, who’s paying for the problem to be solved, what parts of the problem have already been solved, what different kinds of solutions are possible, whether those solutions can be scaled or extended—and much more.”
Weaponizing DCOM for NTLM Authentication Coercions https://github.com/xforcered/RemoteMonologue
Debugging in the terminal isn't difficult anymore 🔥
🛠️ Meet **heretek** — A gdb TUI dashboard
🐛 Supports viewing stack, registers, instructions, hexdump & more!
🚀 Works with remote targets seamlessly (no gdbserver!)
🦀 Written in Rust & built with @ratatui_rs
⭐ GitHub: https://github.com/wcampbell0x2a/heretek
#rustlang #ratatui #tui #gdb #debugging #terminal #linux #commandline