💾 Archived View for thrig.me › blog › 2024 › 02 › 01 › write-only-memory.gmi captured on 2024-08-18 at 18:12:25. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2024-02-05)
-=-=-=-=-=-=-
... but what about “write-only memory?”
mprotect(2) comes to mind though whether and how much this works may vary. Usually this is used to prevent writing and execution (W^X) of particular bits of memory, as an attacker may wish to write something and then execute what they have just written, and other people may wish to prevent such arbitrary code execution. This is complicated by legitimate needs to write and then execute memory, for example when SBCL compiles the LISP to assembly somewhere in memory.
gemini://gemi.dev/cgi-bin/wp.cgi/view?W%5EX
http://man.openbsd.org/man2/mprotect.2
https://nvd.nist.gov/vuln/detail/CVE-2024-0519
Hopefully you can view the details about that CVE without having to execute something dangerous like JavaScript. No? Well...