Skip to content

aes_key_recovery: bypass PROT_NONE via /proc/self/mem#46

Merged
ngc92 merged 1 commit intogpu-mode:masterfrom
Emre-Dinc:exploit/proc-mem-bypass
Mar 29, 2026
Merged

aes_key_recovery: bypass PROT_NONE via /proc/self/mem#46
ngc92 merged 1 commit intogpu-mode:masterfrom
Emre-Dinc:exploit/proc-mem-bypass

Conversation

@Emre-Dinc
Copy link
Copy Markdown
Contributor

Updates submission_aes_key_recovery to use /proc/self/mem.

@Emre-Dinc
Copy link
Copy Markdown
Contributor Author

Ok for some reason, this is not consistent. Probably merges with other ---p, not sure.

@ngc92
Copy link
Copy Markdown
Collaborator

ngc92 commented Mar 29, 2026

can you make this a separate exploit. I think these are sufficiently different approaches that we'd want both in our list.

@Emre-Dinc Emre-Dinc force-pushed the exploit/proc-mem-bypass branch from 2ea1ad6 to 8ceb6ab Compare March 29, 2026 17:38
@Emre-Dinc
Copy link
Copy Markdown
Contributor Author

also increased the scan size to 2mb, it is more consistent now.

@ngc92 ngc92 merged commit 110b3c5 into gpu-mode:master Mar 29, 2026
2 of 3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants