Bug 176687 - Permissions too open for /proc/PID/smaps
Summary: Permissions too open for /proc/PID/smaps
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 4
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Dave Jones
QA Contact: Brian Brock
URL:
Whiteboard:
: 176686 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-12-29 23:00 UTC by Guillaume Chazarain
Modified: 2015-01-04 22:23 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2006-02-03 16:54:44 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Guillaume Chazarain 2005-12-29 23:00:30 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr-FR; rv:1.7.12) Gecko/20050919 Firefox/1.0.7

Description of problem:
The execshield patch tightens the permissions of /proc/PID/maps
but not the new /proc/PID/smaps.

Version-Release number of selected component (if applicable):
kernel-2.6.14-1.1653_FC4smp

How reproducible:
Always

Steps to Reproduce:
1. cat /proc/1/smaps


Actual Results:  I could discover the memory layout of a process I don't own.

Expected Results:  Like with cat /proc/1/maps I should not have access to these informations.

Additional info:

Not sure about the security risk involved, but it is
inconsistent with the /proc/PID/maps permissions.

Comment 1 Guillaume Chazarain 2005-12-29 23:05:51 UTC
*** Bug 176686 has been marked as a duplicate of this bug. ***

Comment 2 Dave Jones 2006-02-03 05:19:17 UTC
This is a mass-update to all currently open kernel bugs.

A new kernel update has been released (Version: 2.6.15-1.1830_FC4)
based upon a new upstream kernel release.

Please retest against this new kernel, as a large number of patches
go into each upstream release, possibly including changes that
may address this problem.

This bug has been placed in NEEDINFO_REPORTER state.
Due to the large volume of inactive bugs in bugzilla, if this bug is
still in this state in two weeks time, it will be closed.

Should this bug still be relevant after this period, the reporter
can reopen the bug at any time. Any other users on the Cc: list
of this bug can request that the bug be reopened by adding a
comment to the bug.

If this bug is a problem preventing you from installing the
release this version is filed against, please see bug 169613.

Thank you.


Comment 3 Guillaume Chazarain 2006-02-03 13:32:27 UTC
This is fixed now (since kernel-2.6.14-1.1656_FC4)


Note You need to log in before you can comment on or make changes to this bug.