Navigation
Search
|
[$] May the FOLL_FORCE not be with you
Friday July 26, 2024. 04:19 PM , from LWN.net
One of the simplest hardening concepts to understand is that memory should
never be both writable and executable, otherwise an attacker can use it to load and run arbitrary code. That rule is generally followed in Linux systems, but there is a glaring loophole that is exploitable from user space to inject code into a running process. Attackers have duly exploited it. A new effort to close the hole ran into trouble early in the merge window, but a solution may yet be found in time for the 6.11 kernel release.
https://lwn.net/Articles/983169/
|
25 sources
Current Date
Nov, Thu 21 - 13:12 CET
|