Lorenzo R v R
to
Lorenzo R v R's feed
The Linux operating system includes a mechanism that passes messages between processes. The implementation allows messages flagged as urgent to skip the queue. This piece of code contains the tiniest of bugs, a dangling pointer which reveals a single byte of data somewhere in the computer’s memory. According to documents released by Anthropic, Mythos was able to coax the operating system into directing the pointer at an area of memory it could write to, and which the operating system would later
The Linux operating system includes a mechanism that passes messages between processes. The implementation allows messages flagged as urgent to skip the queue. This piece of code contains the tiniest of bugs, a dangling pointer which reveals a single byte of data somewhere in the computer’s memory. According to documents released by Anthropic, Mythos was able to coax the operating system into directing the pointer at an area of memory it could write to, and which the operating system would later
10 hours ago
from Android
-
Comment
-
Hide
-
-
[ 0 ]
-
[ 0 ]
- (Edit | Remove)
- More...
which the operating system would later read from. By flooding that area with fake data structures, each instructing the system to fetch a byte from a chosen address, Mythos could direct the system to read from anywhere it wished. By repeatedly calling the buggy code, it was able to establish where the kernel of the operating system was loaded in memory and calculate from that the address of ‘commit_creds’, a function used to grant administrator privileges to selected users. The second phase exploited another bug to plant forged data cleverly crafted to be two things at once: an innocent-looking structure that would be handled by a function called the network scheduler, and an illicit call – concealed by referring to the function’s address rather than its name – to ‘commit_creds’ with forged credentials.
-
Lorenzo R v R
-
[ 0 ]
-
[ 0 ]
- (Edit | Remove)

