Gomium pwn challenge
https://github.com/netanel01/ctf-writeups/blob/master/googlectf/2019/pwn_gomium/README.md [github.com]
2019-11-10 01:23
By doing the above we create a race where we access the implementation of X with the context of good that means if we “win” then inside the unsafe implementation f from the bad context will be used as a function pointer instead of a pointer to an integer. This will result in calling an arbitrary address (0x1337 in our case) which sounds quite promising.
Exploiting torn reads for fun and profit.
source: grugq