Hrm, this looks like it might be a legit regression. 4.4.0-8 passes the
test, while 4.4.0-9.X is failing. In both instances,
/proc/sys/kernel/yama/ptrace_scope is set to 1. It looks like cousin
processes are allowed to ptrace each other, which yama's ptrace
restrictions should prevent.

Looking at the git commits between tags Ubuntu-4.4.0-8.23 and
Ubuntu-4.4.0-9.24, the following commits stand out as being ptrace
relevent:

  commit 969624b7c1c8c9784651eb97431e6f2bbb7a024c
  Author: Jann Horn <j...@thejh.net>
  Date:   Wed Jan 20 15:00:04 2016 -0800
  ptrace: use fsuid, fsgid, effective creds for fs access checks
  upstream commit caaee6234d05a58c5b4d05e7bf766131b810a657 upstream.

and

  commit a76b8ce7ad1f65a96638f161ff83075de04ec9cc
  Author: Jann Horn <j...@thejh.net>
  Date:   Sat Dec 12 21:12:41 2015 +0100
  UBUNTU: SAUCE: (noup) ptrace: being capable wrt a process requires mapped 
uids/gids
  upstream reference https://lkml.org/lkml/2015/12/12/259

But it's not obvious to me why either commit would break this.

** Summary changed:

- linux: ADT test failures with 4.4.0-9.X
+ linux:  4.4.0-9.X fails yama ptrace restrictions tests

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1551894

Title:
  linux:  4.4.0-9.X fails yama ptrace restrictions tests

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  15:55:46 ERROR| [stderr] FAIL: test_093_ptrace_restriction 
(__main__.KernelSecurityTest)
  15:55:46 ERROR| [stderr] ptrace allowed only on children or declared processes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1551894/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to