| Summary: |
kernel: /proc/pid/* information leak |
| Product: |
[Other] Security Response
|
Reporter: |
Eugene Teo (Security Response) <eteo> |
| Component: |
vulnerability | Assignee: |
Red Hat Product Security <security-response-team> |
| Status: |
CLOSED
ERRATA
|
QA Contact: |
|
| Severity: |
low
|
Docs Contact: |
|
| Priority: |
low
|
|
|
| Version: |
unspecified | CC: |
agordeev, anton, arozansk, bhu, dhoward, fhrbata, jkacur, kernel-mgr, lgoncalv, lwang, plougher, pmatouse, rt-maint, segoon, sforsber, solar, vgoyal, williams, wnefal+redhatbugzilla
|
| Target Milestone: |
--- | Keywords: |
Security |
| Target Release: |
--- | |
|
| Hardware: |
All | |
|
| OS: |
Linux | |
|
| Whiteboard: |
|
|
Fixed In Version:
|
|
Doc Type:
|
Bug Fix
|
|
Doc Text:
|
|
Story Points:
|
---
|
|
Clone Of:
|
|
Environment:
|
|
|
Last Closed:
|
2013-08-24 13:35:01 UTC
|
Type:
|
---
|
|
Regression:
|
---
|
Mount Type:
|
---
|
|
Documentation:
|
---
|
CRM:
|
|
|
Verified Versions:
|
|
Category:
|
---
|
|
oVirt Team:
|
---
|
RHEL 7.3 requirements from Atomic Host:
|
|
|
Cloudforms Team:
|
---
|
Target Upstream Version:
|
|
|
Embargoed:
|
|
| |
| Bug Depends On: |
770649, 770650, 770651, 770652, 770653, 770654, 782686
|
|
|
| Bug Blocks: |
770647
|
|
|
/proc/$PID/{sched,schedstat,etc} information leak. demo: http://openwall.com/lists/oss-security/2011/11/05/3 Solution: /proc/$pid/* vuln will be fixed in the following patch series by introducing a restricted procfs permission mode: [RFC v2 1/3] procfs: parse mount options https://lkml.org/lkml/2011/11/19/41 [RFC v2 2/3] procfs: add hidepid= and gid= mount options https://lkml.org/lkml/2011/11/19/42 [PATCH -next] proc: fix task_struct infoleak https://lkml.org/lkml/2011/12/11/62 (fix for previous patch) [RFC v2 3/3] procfs: add documentation for procfs mount options https://lkml.org/lkml/2011/11/19/43 Currently these series are in the -mm tree. Explanation: https://lkml.org/lkml/2011/11/19/42 Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.