Re: How to fix the ptrace flaw without rebooting

Paul Jakma (paul@clubi.ie)
Sun, 6 Apr 2003 02:28:19 +0100 (IST)


On 4 Apr 2003, Alan Cox wrote:

> Thats not a sufficient fix except for people blindly running the
> example exploit

Also, removing CAP_SYS_PTRACE from the capability bounded set does
not close the hole (well, as shown by the exploit) either. It seems
CAP_SYS_PTRACE only closes the case of PTRACE_ATTACH, all other
ptrace()'s work, eg PTRACE_TRACEME -> strace echo foo and the exploit
works too.

Should CAP_SYS_PTRACE not do as the name suggests and completely
disallow ptrace()? (not just PTRACE_ATTACH).

regards,

-- 
Paul Jakma	paul@clubi.ie	paul@jakma.org	Key ID: 64A2FF6A
	warning: do not ever send email to spam@dishone.st
Fortune:
An egghead is one who stands firmly on both feet, in mid-air, on both
sides of an issue.
		-- Homer Ferguson

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/