Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Nothing prevents it if you achieve code execution. But where it helps is scenarios like syscall / memory mapping exploits where a user process can only affect resources attached to their current kernel. For example https://dirtycow.ninja/ would have a limited scope.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: