|
You are here |
github.blog | ||
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The provided text is a detailed technical analysis of a security vulnerability in the TEEgris secure kernel of a Samsung device, focusing on exploit development and reverse engineering techniques. It outlines the following key points: | |
| | | | |
securitylab.github.com
|
|
| | | | | Use-after-free in the Arm Mali GPU kernel driver | |
| | | | |
blog.quarkslab.com
|
|
| | | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | | |
blog.oddbit.com
|
|
| | | Overview I was recently working with someone else's C source and I wanted to add some basic error checking without mucking up the code with a bunch of if statements and calls to perror. I ended up implementing a simple must function that checks the return value of an expression, and exits with an error if the return value is less than 0. You use it like this: must(fd = open("textfile.txt", O_RDONLY)); Or: | ||