Re: 2.4+ptrace exploit fix breaks root's ability to strace

From: Arjan van de Ven (arjanv@redhat.com)
Date: Sat Mar 22 2003 - 10:28:05 EST


> --- orig/kernel/ptrace.c Wed Mar 19 15:54:45 2003
> +++ linux/kernel/ptrace.c Sat Mar 22 10:14:01 2003
> @@ -22,7 +22,7 @@
> int ptrace_check_attach(struct task_struct *child, int kill)
> {
> mb();
> - if (!is_dumpable(child))
> + if (!is_dumpable(child) && !(child->ptrace & PT_PTRACE_CAP))
> return -EPERM;
>
> if (!(child->ptrace & PT_PTRACED))

this sounds really wrong; the child says it doesn't want to be ptraced
and now you allow it anyway. I think the problem is more that the child
isn't dumpable.... checking why



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sun Mar 23 2003 - 22:00:41 EST