|
Message-ID: <CAGXu5jKqdHPDXDrh4sMUNd+ihuJHKwSbygVOHET6cDer7VnN=A@mail.gmail.com> Date: Mon, 16 Dec 2013 09:36:27 -0800 From: Kees Cook <keescook@...omium.org> To: Djalal Harouni <tixxdz@...ndz.org> Cc: LKML <linux-kernel@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Andrew Morton <akpm@...ux-foundation.org>, Al Viro <viro@...iv.linux.org.uk>, "Eric W. Biederman" <ebiederm@...ssion.com>, Oleg Nesterov <oleg@...hat.com>, Andy Lutomirski <luto@...capital.net> Subject: Re: [Resend] [PATCH 0/2] procfs: make /proc/*/{stack,syscall,pagemap} 0400 On Sun, Dec 15, 2013 at 10:57 AM, Djalal Harouni <tixxdz@...ndz.org> wrote: > The following patches make /proc/*/{stack,syscall,personality,pagemap} > 0400. Yes, please! This greatly reduces the scope of the leak problem (with 0400 the leak is possible only if an attacker can spawn the target setuid process, instead of being able to leak from an already running one). -Kees -- Kees Cook Chrome OS Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.