Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4B99E011.70303@kernel.sg>
Date: Fri, 12 Mar 2010 14:32:49 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: coley@...us.mitre.org
Subject: CVE-2010-0729 kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach()

The "ia64: fix deadlock in ia64 sys_ptrace" patch (no reference as it's 
only added in our shipped kernels) moved ptrace_check_attach() from 
find_thread_for_addr() to tasklist-is-not-held area. However it 
introduced other problems.

One of the problems is security-relevant. In certain code path, it is 
possible that ptrace_check_attach() is not called, and the user can do 
ptrace() on any target even without PTRACH_ATTACH.

This only affects Red Hat Enterprise Linux 4.

https://bugzilla.redhat.com/CVE-2010-0729

Thanks, Eugene


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.