All of lore.kernel.org
 help / color / mirror / Atom feed
* [kernel-hardening] Legitimate use of /proc/PID/mem,maps and smaps
@ 2016-11-02  3:42 Marian Marinov
  2016-11-02 15:00 ` Dave Tian
  2016-11-02 16:10 ` Adam Sampson
  0 siblings, 2 replies; 5+ messages in thread
From: Marian Marinov @ 2016-11-02  3:42 UTC (permalink / raw)
  To: kernel-hardening

Hi guys,
after dirtyCoW me and colleges of mine started discussing different vectors of exploiting applications and we noticed that a lot of the exploits we were discussing relied on /proc/PID/mem or mpas or smaps to be readable by the same user.

We started thinking of legitimate use of these files (lsof, gdb with plugins and valgrind). Are there any other legitimate users of these files, maybe X?

I'm considering writing a patch, which will make sure that nobody, even the owner of the process, can't open these files and only root or users with CAP_DAC_OVERRIDE and/or CAP_SYS_ADMIN can see these files.
For everyone that is not root and lacks DAC_OVERRIDE and SYS_ADMIN the files should not exists.

What do you think about this?

Best regards,
Marian

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2016-11-03  2:30 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-02  3:42 [kernel-hardening] Legitimate use of /proc/PID/mem,maps and smaps Marian Marinov
2016-11-02 15:00 ` Dave Tian
2016-11-02 16:10 ` Adam Sampson
2016-11-03  0:54   ` Marian Marinov
2016-11-03  2:30     ` Dave Tian

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.