[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] Open letter to SUN/Cobalt



* Michael Stauber <cobalt@xxxxxxxxxxxxxx> [010502 19:20]:
> Question: So the new kernels fix the ptrace() and sysctl() functions 
> properly?

I'm assuming the sysctl() one was fine with C24 (I never looked at it
personally).

The problem with the ptrace race condition was this: when the exploit
was first found and patched, it was around 2.2.19pre9 or so... that took
care of the exploit going around, but then it was found that the kernel
patch only closed the window on the race condition rather than
eliminating it completely.  Later in the 2.2.19preX kernels (and present
in 2.2.19 final) was an update to the patch that finally took care of
the issue.

What I'm getting at is what's in C24 is like 2.2.19pre9 (with regard to
the exploit), and C25 has was was done for 2.2.19 final.  The exploit I
have here for testing no longer works on C25, behaving exactly as it
does on my notebook running 2.2.19 (i.e. not vulnerable).  

Hope that helps. :)