Hi Salvatore, all,

On Fri, May 15, 2026 at 07:12:08AM +0200, Salvatore Bonaccorso wrote:
> I'm not 100% certain, but setting restrictive kernel.yama.ptrace_scope
> might as well serve as temporary workaround. Can you confirm?

Excellent question, thank you very much! We have just now tried, and
setting /proc/sys/kernel/yama/ptrace_scope to 2 (admin-only attach) or 3
(no attach) does in fact protect against all the exploits that we know
of (but in theory at least other exploitation methods might exist).

Thanks again! With best regards,

-- 
the Qualys Security Advisory team

Reply via email to