Robert Watson's paper discusses concurrency vulnerabilities. Impact
include policy bypass and audit trail invalidation. A bypass means it
is useless. That pretty much hammered in the last nail on the coffin
for security tools based on system call interposition.

On 10/15/07, Steve Shockley <[EMAIL PROTECTED]> wrote:
> Joachim Schipper wrote:
> > You should probably do a Google search on systrace before continuing
> > further down this road. In particular, I believe the issue highlighted
> > by Robert Watson has not been fixed yet (although I could be wrong, and
> > would be happy to be wrong in this case).
>
> The white paper for the systrace vulnerability was a little bit beyond
> me; what's the impact of the issue?  Is a system running systrace *more*
> vulnerable than a normal system, or is the problem just that a
> determined user can circumvent systrace (like the bottom of systrace(1)
> suggests)?  If it's the latter, it seems like it'd still be useful for
> policy enforcement to some extent.

Reply via email to