Red Hat Bugzilla – Bug 176687
Permissions too open for /proc/PID/smaps
Last modified: 2015-01-04 17:23:56 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr-FR; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
Description of problem:
The execshield patch tightens the permissions of /proc/PID/maps
but not the new /proc/PID/smaps.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. cat /proc/1/smaps
Actual Results: I could discover the memory layout of a process I don't own.
Expected Results: Like with cat /proc/1/maps I should not have access to these informations.
Not sure about the security risk involved, but it is
inconsistent with the /proc/PID/maps permissions.
*** Bug 176686 has been marked as a duplicate of this bug. ***
This is a mass-update to all currently open kernel bugs.
A new kernel update has been released (Version: 2.6.15-1.1830_FC4)
based upon a new upstream kernel release.
Please retest against this new kernel, as a large number of patches
go into each upstream release, possibly including changes that
may address this problem.
This bug has been placed in NEEDINFO_REPORTER state.
Due to the large volume of inactive bugs in bugzilla, if this bug is
still in this state in two weeks time, it will be closed.
Should this bug still be relevant after this period, the reporter
can reopen the bug at any time. Any other users on the Cc: list
of this bug can request that the bug be reopened by adding a
comment to the bug.
If this bug is a problem preventing you from installing the
release this version is filed against, please see bug 169613.
This is fixed now (since kernel-2.6.14-1.1656_FC4)