|
|
Message-ID: <20260515102305.GA21592@localhost.localdomain> Date: Fri, 15 May 2026 10:23:21 +0000 From: Qualys Security Advisory <qsa@...lys.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Re: Logic bug in the Linux kernel's __ptrace_may_access() function Hi Salvatore, all, On Fri, May 15, 2026 at 07:12:08AM +0200, Salvatore Bonaccorso wrote: > I'm not 100% certain, but setting restrictive kernel.yama.ptrace_scope > might as well serve as temporary workaround. Can you confirm? Excellent question, thank you very much! We have just now tried, and setting /proc/sys/kernel/yama/ptrace_scope to 2 (admin-only attach) or 3 (no attach) does in fact protect against all the exploits that we know of (but in theory at least other exploitation methods might exist). Thanks again! With best regards, -- the Qualys Security Advisory team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.