The Linux Kernel Runtime Guard has been devised by the Openwall project.
LKRG checks at runtime to find out if any exploits for security flaws are in a system; if so, it attempts to block such attacks.
It can also detect any privilege escalation in processes that are running and kill the guilty process before it can execute any code.
Linux creator Linus Torvalds did not offer any comment when asked about the possibility of the module being accepted into the mainline kernel.
Another group, Grsecurity, creates a hardening patch for the kernel, but its efforts have not been exactly warmly received by Torvalds.
He has, in the past, described the patch as "pure garbage".
Asked about how Grsecurity dealt with a particular issue, Torvalds responded: "Don't bother with Grsecurity. Their approach has always been 'we don't care if we break anything, we'll just claim it's because we're extra secure'.
"The thing is a joke, and they are clowns. When they started talking about people taking advantage of them, I stopped trying to be polite about their bullshit. Their patches are pure garbage."
Asked about LKRG, Linux expert Russell Coker, a longtime developer for the Debian GNU/Linux project who has also contributed code to the NSA's SE-Linux project, told iTWire: "The aim of that is to protect against kernel attacks that have not been specifically written to avoid such checks.
"While that module is used by hardly anyone there won't be attacks written to avoid it so it will do some good. If it was in the mainline kernel then attackers would write attacks to compromise the kernel and report the same hashes. Which would still make it harder to write attacks.
"I think that we have bigger problems in bad userspace code running as root or running with access to sensitive data."
He said Torvalds was very conservative about what went into the kernel. "It doesn't seem likely that this sort of thing will be well regarded, other smaller changes have taken years to get accepted. See this link," he added.