Bug 176687

Summary: Permissions too open for /proc/PID/smaps
Product: [Fedora] Fedora Reporter: Guillaume Chazarain <guichaz>
Component: kernelAssignee: Dave Jones <davej>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 4CC: pfrields, wtogami
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-02-03 16:54:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Guillaume Chazarain 2005-12-29 23:00:30 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr-FR; rv:1.7.12) Gecko/20050919 Firefox/1.0.7

Description of problem:
The execshield patch tightens the permissions of /proc/PID/maps
but not the new /proc/PID/smaps.

Version-Release number of selected component (if applicable):
kernel-2.6.14-1.1653_FC4smp

How reproducible:
Always

Steps to Reproduce:
1. cat /proc/1/smaps


Actual Results:  I could discover the memory layout of a process I don't own.

Expected Results:  Like with cat /proc/1/maps I should not have access to these informations.

Additional info:

Not sure about the security risk involved, but it is
inconsistent with the /proc/PID/maps permissions.

Comment 1 Guillaume Chazarain 2005-12-29 23:05:51 UTC
*** Bug 176686 has been marked as a duplicate of this bug. ***

Comment 2 Dave Jones 2006-02-03 05:19:17 UTC
This is a mass-update to all currently open kernel bugs.

A new kernel update has been released (Version: 2.6.15-1.1830_FC4)
based upon a new upstream kernel release.

Please retest against this new kernel, as a large number of patches
go into each upstream release, possibly including changes that
may address this problem.

This bug has been placed in NEEDINFO_REPORTER state.
Due to the large volume of inactive bugs in bugzilla, if this bug is
still in this state in two weeks time, it will be closed.

Should this bug still be relevant after this period, the reporter
can reopen the bug at any time. Any other users on the Cc: list
of this bug can request that the bug be reopened by adding a
comment to the bug.

If this bug is a problem preventing you from installing the
release this version is filed against, please see bug 169613.

Thank you.


Comment 3 Guillaume Chazarain 2006-02-03 13:32:27 UTC
This is fixed now (since kernel-2.6.14-1.1656_FC4)