▲ | IAmLiterallyAB 3 days ago | |
What's preventing a compromised kernel on one core from hijacking the other cores? This doesn't seem like much of a security boundary | ||
▲ | viraptor 3 days ago | parent | next [-] | |
Nothing prevents it if you achieve code execution. But where it helps is scenarios like syscall / memory mapping exploits where a user process can only affect resources attached to their current kernel. For example https://dirtycow.ninja/ would have a limited scope. | ||
▲ | 3 days ago | parent | prev [-] | |
[deleted] |