Navigation
Recherche
|
[$] May the FOLL_FORCE not be with you
vendredi 26 juillet 2024, 16:19 , par LWN.net
One of the simplest hardening concepts to understand is that memory should
never be both writable and executable, otherwise an attacker can use it to load and run arbitrary code. That rule is generally followed in Linux systems, but there is a glaring loophole that is exploitable from user space to inject code into a running process. Attackers have duly exploited it. A new effort to close the hole ran into trouble early in the merge window, but a solution may yet be found in time for the 6.11 kernel release.
https://lwn.net/Articles/983169/
|
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 17:10 CET
|