Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Good to see that the technique is still viable after two decades.

It absolutely blew my mind to learn that Debian is still shipping with Yama mitigations disabled by default (last time I checked, which was about a year ago). I think they're one of the only mainstream distros to be doing this, although I haven't done a comprehensive survey.



The Debian patch for this setting is: https://salsa.debian.org/kernel-team/linux/-/blob/master/deb...

The decision made there is from 2013 (see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712740), so it might be worth revisiting.

Could you file a bug report to get the discussion started?


I think this is so users can choose what level of restriction they want using kernel.yama.ptrace_scope with sysctl, 0 being the default and 2 being the most restrictive.


You can configure it on most distros, it doesn't excuse having an insecure default.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: