Bugzilla will be upgraded to version 5.0 on December 2, 2018. The outage period for the upgrade will start at 0:00 UTC and have a duration of 12 hours
Bug 34058 - ptrace race fixed in 2.2.17-14?
ptrace race fixed in 2.2.17-14?
Status: CLOSED DUPLICATE of bug 34594
Product: Red Hat Linux
Classification: Retired
Component: kernel (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Michael K. Johnson
Brock Organ
: Security
Depends On:
  Show dependency treegraph
Reported: 2001-03-30 08:31 EST by Need Real Name
Modified: 2007-04-18 12:32 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-04-07 18:53:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2001:047 normal SHIPPED_LIVE : Linux kernel 2.2.19 now available, provides security fixes, enhancements 2001-04-10 00:00:00 EDT

  None (edit)
Description Need Real Name 2001-03-30 08:31:27 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux 2.4.2-ac6 i686; en-US; m18)

According to Bugtraq an exploitable race exists in kernel "up to 2.2.18".
The rpm contains something that looks like a patch
(linux-2.2.19-ptrace.patch), but I'd like some statement whether it
actually fixes the problem.

"Solar designer" notes on BUGTRAQ that there may be other possible races
involving ptrace().

An exploit was published on BUGTRAQ on 27.03.01.

Reproducible: Didn't try
Steps to Reproduce:
Comment 1 Arjan van de Ven 2001-04-07 18:52:55 EDT
The errata notes provide this information.  The answer is that
at the time of release, it fixed all known ptrace bugs.
Comment 2 Milan Kerslager 2001-04-13 08:42:43 EDT

*** This bug has been marked as a duplicate of 34594 ***

Note You need to log in before you can comment on or make changes to this bug.