[New: openFATE 318458] Reading user process memory
Feature added by: Sławomir Lach (Lachu) Feature #318458, revision 1 Title: Reading user process memory Requested by: Sławomir Lach (lachu) Partner organization: openSUSE.org Description: Reading user's process memory or writting to it is very bad think. Malware can stole passwords or change settings of application. I have two idea about solving this issue: 1. Dissallow to debug(reading/writting memory) process placed in /bin, /sbin, /usr/bin, /usr/sbin 2. Dissallow to debug(reading/writting memory) process of file not belonging to user, who execute file. -- openSUSE Feature: https://features.opensuse.org/318458
Feature changed by: Sławomir Lach (Lachu) Feature #318458, revision 2 Title: Reading user process memory Requested by: Sławomir Lach (lachu) Partner organization: openSUSE.org Description: Reading user's process memory or writting to it is very bad think. Malware can stole passwords or change settings of application. I have two idea about solving this issue: 1. Dissallow to debug - (reading/writting memory) process placed in /bin, /sbin, /usr/bin, - /usr/sbin 2. Dissallow to debug(reading/writting memory) process of - file not belonging to user, who execute file. + (reading/writting memory) process of programs placed in /bin, /sbin, + /usr/bin, /usr/sbin 2. Dissallow to debug(reading/writting memory) + process of file not belonging to user, who execute file. -- openSUSE Feature: https://features.opensuse.org/318458
participants (1)
-
fate_noreply@suse.de