Bug 91722 - cannot ptrace process which has setuid()
Summary: cannot ptrace process which has setuid()
Alias: None
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel (Show other bugs)
(Show other bugs)
Version: 2.1
Hardware: i686 Linux
Target Milestone: ---
Assignee: Larry Woodman
QA Contact: Brian Brock
Depends On:
Blocks: 106715
TreeView+ depends on / blocked
Reported: 2003-05-27 16:12 UTC by Joe Orton
Modified: 2012-06-20 13:20 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2012-06-20 13:20:03 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Joe Orton 2003-05-27 16:12:30 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20030225

Description of problem:
The ptrace security fixes were discovered to be buggy: they prevent ptrace()ing
a process which has called setuid().

This makes it very difficult, for instance, to debug an Apache httpd server.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. service httpd start
2. ps axf # and find an httpd child
3. strace -p <thepid>
Actual Results:  attach: ptrace(PTRACE_ATTACH, ...): Operation not permitted

Expected Results:  normal strace output.

Additional info:

This was fixed in some of the kernel updates for RHL, e.g. kernel-2.4.20-13.9
works correctly.

Comment 2 Jason Baron 2003-11-20 19:07:16 UTC
fixed for U3

Comment 3 Jiri Pallich 2012-06-20 13:20:03 UTC
Thank you for submitting this issue for consideration in Red Hat Enterprise Linux. The release for which you requested us to review is now End of Life. 
Please See https://access.redhat.com/support/policy/updates/errata/

If you would like Red Hat to re-consider your feature request for an active release, please re-open the request via appropriate support channels and provide additional supporting details about the importance of this issue.

Note You need to log in before you can comment on or make changes to this bug.