Remix.run Logo
IAmLiterallyAB 3 days ago

What's preventing a compromised kernel on one core from hijacking the other cores? This doesn't seem like much of a security boundary

viraptor 3 days ago | parent | next [-]

Nothing prevents it if you achieve code execution. But where it helps is scenarios like syscall / memory mapping exploits where a user process can only affect resources attached to their current kernel. For example https://dirtycow.ninja/ would have a limited scope.

3 days ago | parent | prev [-]
[deleted]