smap
×
bug-bounty
1170
google
496
exploit
481
microsoft
480
xss
426
malware
399
rce
310
facebook
310
apple
285
cve
254
supply-chain
239
writeup
201
node
185
web3
169
cloudflare
148
browser
142
phishing
133
account-takeover
121
sqli
121
aws
118
reverse-engineering
115
csrf
108
docker
105
dos
104
open-source
97
8
0
This article explores how the /proc/self/mem pseudofile can write to memory marked as unwritable by bypassing MMU protections through kernel virtual memory subsystem manipulation, specifically via the FOLL_FORCE flag in get_user_pages() that skips write permission checks. The technique allows patching read-only memory including libc code pages, with implications for understanding kernel-hardware memory protection constraints.