Feature added by: Sławomir Lach (Lachu)
Feature #318458, revision 1 Title: Reading user process memory
Requested by: Sławomir Lach (lachu) Partner organization: openSUSE.org
Description: Reading user's process memory or writting to it is very bad think. Malware can stole passwords or change settings of application.
I have two idea about solving this issue: 1. Dissallow to debug(reading/writting memory) process placed in /bin, /sbin, /usr/bin, /usr/sbin 2. Dissallow to debug(reading/writting memory) process of file not belonging to user, who execute file.
Feature changed by: Sławomir Lach (Lachu) Feature #318458, revision 2 Title: Reading user process memory
Requested by: Sławomir Lach (lachu) Partner organization: openSUSE.org
Description: Reading user's process memory or writting to it is very bad think. Malware can stole passwords or change settings of application. I have two idea about solving this issue: 1. Dissallow to debug - (reading/writting memory) process placed in /bin, /sbin, /usr/bin, - /usr/sbin 2. Dissallow to debug(reading/writting memory) process of - file not belonging to user, who execute file. + (reading/writting memory) process of programs placed in /bin, /sbin, + /usr/bin, /usr/sbin 2. Dissallow to debug(reading/writting memory) + process of file not belonging to user, who execute file.