Bug 104237 - LTC4327-The /proc/<pid>/maps file for a suid program is no longer world readable
LTC4327-The /proc/<pid>/maps file for a suid program is no longer world readable
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: kernel (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Dave Jones
Brian Brock
Depends On:
  Show dependency treegraph
Reported: 2003-09-11 12:12 EDT by IBM Bug Proxy
Modified: 2015-01-04 17:03 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-10-25 22:14:39 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description IBM Bug Proxy 2003-09-11 12:12:31 EDT
The following has be reported by IBM LTC:  
The /proc/<pid>/maps file for a suid program is no longer world readable
Hardware Environment:

Software Environment:

Steps to Reproduce:

1.  create a suid program

2.  run it

3.  ls -l /proc/<pid>/maps

Actual Results:

it is r--r----- 

Expected Results:

in previous distros, it was r--r--r--

Additional Information:

Why was this change made?  When DB2 traps, this prevents us from dumping the 

/proc/<pid>/maps file to our trap file thus making diagnosis of the problem more

difficult.Just checked machine that has Beta 2 on it.
It is still r--r----- 
[root@milicent root]# ps -ef | grep inet
root      1289     1  0 Sep09 ?        00:00:00 xinetd -stayalive -
pidfile /var/run/xinetd.pid
root      2228  2179  0 14:25 pts/0    00:00:00 grep inet
[root@milicent root]# ls -l /proc/1289/maps
-r--r-----    1 root     root            0 Sep 10 14:26 /proc/1289/maps
[root@milicent root]#
Comment 1 Arjan van de Ven 2003-09-11 12:44:51 EDT
This is as designed; the /proc/<pid>/maps file contains security sensitive
information and thus should be per user only, just like the /proc/<pid>/fd stuff is.
Comment 2 IBM Bug Proxy 2003-09-15 12:35:26 EDT
------ Additional Comments From jmcrae@ca.ibm.com  2003-15-09 11:36 -------
You mentioned that only the user should see this file. In our case, it was the 
user that attempted to view it, just that the user had already given up it's 
setuid priviledges.  Should the ownership of the maps file change to reflect 
Comment 3 IBM Bug Proxy 2003-09-16 18:57:38 EDT
------ Additional Comments From khoa@us.ibm.com  2003-16-09 18:52 -------
Glen/Greg - we need to push RH for an answer to Jeff McRae's question.
Comment 4 Arjan van de Ven 2003-09-17 03:06:50 EDT
the same privileges as /proc/<pid>/fd apply to /proc/<pid>/maps
setuid is a special case and the kernel generally treats such a case very very
careful (eg it won't write out a coredump either) since it is assumed that the
app may contain privileged information it aquired during the "root" phase of the
process' lifetime.
Comment 5 IBM Bug Proxy 2003-09-26 00:04:38 EDT
------ Additional Comments From khoa@us.ibm.com  2003-25-09 23:44 -------
Based on Red Hat's comment above, I'd like to reject this bug as NOTABUG.
Comment 6 IBM Bug Proxy 2005-05-24 10:44:33 EDT

           What    |Removed                     |Added
             Status|REJECTED                    |CLOSED

------- Additional Comments From yvchan@ca.ibm.com  2005-05-24 10:41 EDT -------
closed by yyc. 

Note You need to log in before you can comment on or make changes to this bug.