Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260515102305.GA21592@localhost.localdomain>
Date: Fri, 15 May 2026 10:23:21 +0000
From: Qualys Security Advisory <qsa@...lys.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: Logic bug in the Linux kernel's
 __ptrace_may_access() function

Hi Salvatore, all,

On Fri, May 15, 2026 at 07:12:08AM +0200, Salvatore Bonaccorso wrote:
> I'm not 100% certain, but setting restrictive kernel.yama.ptrace_scope
> might as well serve as temporary workaround. Can you confirm?

Excellent question, thank you very much! We have just now tried, and
setting /proc/sys/kernel/yama/ptrace_scope to 2 (admin-only attach) or 3
(no attach) does in fact protect against all the exploits that we know
of (but in theory at least other exploitation methods might exist).

Thanks again! With best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.