On Wed, Mar 28, 2001 at 01:32:15AM +0200, Mariusz Woloszyn wrote: > Anyway: here is a fast way to fix the problem (but intoduces new one), the > kernel module that disables ptrace syscall. Don't forget that the race isn't only against ptrace. There's procfs. Fortunately, get_task() in fs/proc/mem.c checks for PF_PTRACED, so the worst ways of abuse via procfs are solved with disabling ptrace. But it is not so obvious what other attacks remain possible. -- /sd
- ptrace/execve race condition exploit (non brute-force) Wojciech Purczynski
- Re: ptrace/execve race condition exploit (non bru... Wouter de Jong
- Re: ptrace/execve race condition exploit (non bru... Solar Designer
- Re: ptrace/execve race condition exploit (brute f... Paul Starzetz
- Re: ptrace/execve race condition exploit (non bru... Mariusz Woloszyn
- Re: ptrace/execve race condition exploit (non... Solar Designer
- Re: ptrace/execve race condition exploit (non... Paul Starzetz
