OCTADE

@octade@soc.octade.net

(Owner soc.octade.net) (5&2)()()

For thoughtful response to thoughtful inquiry contact my email. Don't send me private direct messages on the Fediverse. If you have a general question ask it in a public timeline. I block users who send me annoying private messages about things that should be asked in a public timeline.

NAME : Raze
ABOUT : https://soc.octade.net/octade/p/1738730010.732958
LINKS : https://soc.octade.net/octade/p/1738730079.782260
SITE : https://octade.net
NEWS : news://alt.flashback | news://alt.crossover

SLOGAN : Speak not with words. Speak with work product.

PRONOMS : | | | | | |





LINKS

Cryptography project site
Publications
ORCID
[Netnews] Find me on in alt.rhubarb.
Git Repositories
Keyoxide1
Keyoxide2
BlueSky
HackerNews
Internet Archive

1 ★ 0 ↺

[?]OCTADE » 🌐
@octade@soc.octade.net

Linux could be changed to prevent a whole class of potential future page cache exploits.

'/usr/bin/su' and '/bin/su would never be in the memory cache at all ... by default ... except in systems that run entirely in memory.

Perhaps suid binaries should have special sandboxing for forcing them to be read from protected media into sandboxed memory addresses.

Maybe that would be a tougher nut to crack?


    ...

    [?]sam » 🔓
    @thesamesam@social.treehouse.systems

    @octade This won't do any good. The page cache vulnerabilities mean you can poison any file or binary, it's just convenient to pick on suid. You could target anything that runs as root in a cronjob, or poison /etc/*.

      History