Bug 176686 - Permissions too open for /proc/PID/smaps
Permissions too open for /proc/PID/smaps
Status: CLOSED DUPLICATE of bug 176687
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
4
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Kernel Maintainer List
Brian Brock
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-12-29 18:00 EST by Guillaume Chazarain
Modified: 2007-11-30 17:11 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-12-29 18:05:32 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Guillaume Chazarain 2005-12-29 18:00:03 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr-FR; rv:1.7.12) Gecko/20050919 Firefox/1.0.7

Description of problem:
The execshield patch tightens the permissions of /proc/PID/maps
but not the new /proc/PID/smaps.

Version-Release number of selected component (if applicable):
kernel-2.6.14-1.1653_FC4smp

How reproducible:
Always

Steps to Reproduce:
1. cat /proc/1/smaps


Actual Results:  I could discover the memory layout of a process I don't own.

Expected Results:  Like with cat /proc/1/maps I should not have access to these informations.

Additional info:

Not sure about the security risk involved, but it is
inconsistent with the /proc/PID/maps permissions.
Comment 1 Guillaume Chazarain 2005-12-29 18:05:32 EST
Sorry for the double click ;-)

*** This bug has been marked as a duplicate of 176687 ***

Note You need to log in before you can comment on or make changes to this bug.