|
|
Message-ID: <20110604202018.GA8019@shinshilla>
Date: Sun, 5 Jun 2011 00:20:47 +0400
From: Vasiliy Kulikov <segoon@...nwall.com>
To: kernel-hardening@...ts.openwall.com
Cc: Pavel Labushev <p.labushev@...il.com>
Subject: Re: /proc/PID directory hiding (was: [owl-dev]
segoon's status report - #1 of 15)
On Sat, Jun 04, 2011 at 22:19 +0400, Solar Designer wrote:
> > It is:
> > $ python -c 'import os; print os.stat("/proc/1")'
> > posix.stat_result(st_mode=16744, st_ino=535821L, st_dev=3L, st_nlink=6,
> > st_uid=0, st_gid=0, st_size=0L, st_atime=1306605485, st_mtime=1306605485,
> > st_ctime=1306605485)
> >
> > It's a known flaw and AFAIR it was considered irrelevant.
>
> Is the above on grsecurity?
No, grsecurity hides uid/gid from both *stat*(2) and getdents*(2) functions
(implemented as proc_pid_readdir() and pid_getattr()).
> As to probing for PIDs with syscalls such as kill(2), we may deal with
> that as well
I'd not do this. There are too many paths using pids, I don't think
there is some universal way (read: a bottleneck) to filter all accesses.
And the award is not too high to bother.
Thanks,
Vasiliy.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.