Skip to content

Conversation

@raja-grewal
Copy link
Contributor

This pull request restrict processes from modifying their own memory mappings unless actively done via ptrace() in order to limit self-modification which can trigger exploits.

As per suggested in #330.

Note that this can be futher hardened by never allowing overrides using proc_mem.force_override=never instead.

Changes

Set the proc_mem.force_override=ptrace kernel boot parameter.

Mandatory Checklist

  • Legal agreements accepted. By contributing to this organisation, you acknowledge you have read, understood, and agree to be bound by these these agreements:

Terms of Service, Privacy Policy, Cookie Policy, E-Sign Consent, DMCA, Imprint

Optional Checklist

The following items are optional but might be requested in certain cases.

  • I have tested it locally
  • I have reviewed and updated any documentation if relevant
  • I am providing new code and test(s) for it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant