proc-filesystem
×
bug-bounty
1121
microsoft
460
google
452
exploit
449
malware
377
xss
323
facebook
293
rce
293
apple
270
cve
235
supply-chain
231
writeup
182
web3
167
node
161
cloudflare
141
browser
131
phishing
124
sqli
120
aws
117
reverse-engineering
112
account-takeover
111
docker
103
dos
101
csrf
99
open-source
97
8
0
This article explores how the /proc/self/mem pseudofile can write to memory marked as unwritable by bypassing MMU protections through kernel virtual memory subsystem manipulation, specifically via the FOLL_FORCE flag in get_user_pages() that skips write permission checks. The technique allows patching read-only memory including libc code pages, with implications for understanding kernel-hardware memory protection constraints.