OCTADE
@octade@soc.octade.net
'/usr/bin/su' and '/bin/su would never be in the memory cache at all ... by default ... except in systems that run entirely in memory.
Perhaps suid binaries should have special sandboxing for forcing them to be read from protected media into sandboxed memory addresses.
Maybe that would be a tougher nut to crack?
@octade This won't do any good. The page cache vulnerabilities mean you can poison any file or binary, it's just convenient to pick on suid. You could target anything that runs as root in a cronjob, or poison /etc/*.