| ▲ | yencabulator 2 days ago |
| So a shared-memory ringbuffer? Better make it clear that sender can perform TOCTOU attacks on the receiver. There seems to be a fuzz tester for the header, but the application logic would be the real target. |
|
| ▲ | riyaneel 2 days ago | parent [-] |
| Exactly, the application logic is the target. Actually doing seccomp bpf base but for managed bindings (Java, Node, Go, ...) add a lot of complexity.... |
| |
| ▲ | oasisaimlessly a day ago | parent [-] | | What? > Exactly, the application logic is the target. Actually doing seccomp bpf base but for managed bindings (Java, Node, Go, ...) add a lot of complexity.... Maybe proofread the slop before posting it next time? | | |
| ▲ | riyaneel a day ago | parent [-] | | Just having a bad english. But yes, the application logic is where the vulnerability can occur. I am adding support for seccomp-BPF but this is complicated for managed runtimes like Go, JVM, Node, Python. |
|
|