default `kernel.yama.ptrace_scope = 0` revisited. update to >=1 ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



in

	distro
		Name: Fedora Linux 40 (Forty)
		Version: 40
		Codename:

	uname -rm
		6.10.3-200.fc40.x86_64 x86_64


default ptrace is DISABLED,

	cat /usr/lib/sysctl.d/10-default-yama-scope.conf
		...
		kernel.yama.ptrace_scope = 0

	grep -iE "yama|ptrace" /boot/config-6.10.3-200.fc40.x86_64
		# CONFIG_YAMAHA_YAS530 is not set
		CONFIG_SECURITY_YAMA=y
		CONFIG_LSM="lockdown,yama,integrity,selinux,bpf,landlock"

provided by

	rpm -q --whatprovides /usr/lib/sysctl.d/10-default-yama-scope.conf
		elfutils-default-yama-scope-0.191-4.fc40.noarch

required by

	dnf repoquery --requires elfutils-default-yama-scope
!!		/bin/sh

listed as 'medium' severity at, e.g.,

	RHEL 9 must restrict usage of ptrace to descendant processes.
	 https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/2023-09-13/finding/V-257811

		"Unrestricted usage of ptrace allows compromised binaries to run ptrace on other
		 processes of the user. Like this, the attacker can steal sensitive information
		 from the target processes (e.g., SSH sessions, web browser, etc.) without any
		 additional assistance from the user (i.e., without resorting to phishing).
		 Satisfies: SRG-OS-000132-GPOS-00067, SRG-OS-000480-GPOS-00227"

&

	Protect against ptrace of processes: kernel.yama.ptrace_scope
	 https://linux-audit.com/protect-ptrace-processes-kernel-yama-ptrace_scope/

both recommend

	kernel.yama.ptrace_scope > 0

it's been discussed at great length @ Fedora/RH long ago,

	Bug 1209492 - BUG: Yama blocks ptrace'ing my own process
	 https://bugzilla.redhat.com/show_bug.cgi?id=1209492

	Bug 1250178 - Review Request: yama-config-disable-ptrace - Disable Yama ptrace restrictions at boot
	 https://bugzilla.redhat.com/show_bug.cgi?id=1250178

in the above discussions, use cases including "password manager" are bandied about.

it's recently raised its head in a password manager -- 1password, specifically

	https://1password.community/discussion/comment/715818/#Comment_715818

, which had/has affected a significant # of users here.

afaict (?) no further discussion @ RH BZ since the 2015 thread,
the original assignee left RH, off to MS,
and, the "= 0" default remains as of today, stating clearly @

	/usr/lib/sysctl.d/10-default-yama-scope.conf

		...
		# This runtime kernel parameter can be set to the following options:
!!		# (Note that setting this to anything except zero will break programs!)
		...

given the advisories, the current effects on userspace apps, and other distros' (Debian/Ubuntu at least) switch to "=1", what's the current rationale for keeping the Fedora *default* sysctl = 0?


--
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux