Bug 655640 - [RFE] initscripts: kernel: make /proc/kallsyms mode 400 to reduce ease of attacking [rhel-5.6]
Summary: [RFE] initscripts: kernel: make /proc/kallsyms mode 400 to reduce ease of att...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: initscripts
Version: 5.6
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: initscripts Maintenance Team
QA Contact: qe-baseos-daemons
URL:
Whiteboard:
Depends On: 655638 655650 655652
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-11-22 03:03 UTC by Eugene Teo (Security Response)
Modified: 2010-11-22 04:34 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of: 655638
Environment:
Last Closed: 2010-11-22 04:34:55 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Eugene Teo (Security Response) 2010-11-22 03:03:05 UTC
+++ This bug was initially created as a clone of Bug #655638 +++

Description of problem:
Making /proc/kallsyms readable only for root by default makes it slightly harder for attackers to write generic kernel exploits by removing one source of knowledge where things are in the kernel.

This was originally committed in the kernel in upstream commit 59365d13 but was later reverted in 33e0d57f. It's unlikely that the upstream kernel would accept this patch again, so what we could do at our side is to "chmod -r /proc/kallsyms" in our bootup scripts. And make sure it doesn't break anything.

http://git.kernel.org/linus/59365d136d205cc20fe666ca7f89b1c5001b0d5a
http://git.kernel.org/linus/33e0d57f5d2f079104611be9f3fccc27ef2c6b24

Comment 1 Bill Nottingham 2010-11-22 04:24:14 UTC
Do it in the kernel, or don't do it. Doing it in initscripts is a kludge.

Comment 2 RHEL Program Management 2010-11-22 04:34:55 UTC
Development Management has reviewed and declined this request.  You may appeal
this decision by reopening this request.


Note You need to log in before you can comment on or make changes to this bug.