Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Avoid calling PR_SET_NO_NEW_PRIVS if privileged enough
When tracing a process that needs to execute setuid(2) or similar operations that require privilege escalation (e.g., sudo), it is necessary to avoid calling prctl(PR_SET_NO_NEW_PRIVS, 1). This call would prevent the tracee process from gaining the required privileges, leading to failures. Related issue #11 #11 (comment)
- Loading branch information