Love it! I didn’t know about it, and will check that out today, Thanks for share @Head_on_a_Stick!
Update: I’ve just read it and I’m very impressed, that’s a very valuable effort to the open source community which I’ve never heard of… I’m sending to a friend who works at the security department for a brazilian oil company, if he doesn’t know it already, he might be interested into test them out or even support it. I am yet a restless student on this business and still solidifying the fundamentals, so i enforce again that I’m very grateful for this input @Head_on_a_Stick.
Also my paranoid side is very happy
Ps: It seems that they’re working hard on this:
“However, it wouldn’t be expected to detect exploits of CVE-2016-5195 (Dirty COW) since those directly target the userspace even if via the kernel. While in case of Dirty COW the LKRG “bypass” happened due to the nature of the bug and this being the way to exploit it, it’s also a way for future exploits to bypass LKRG by similarly directly targeting userspace. It remains to be seen whether such exploits become common (unlikely unless LKRG or similar become popular?) and what (negative?) effect on their reliability this will have (for kernel vulnerabilities where directly targeting the userspace isn’t essential and possibly not straightforward).”