Revision 1.4 set access for all sensitive files in /proc/<PID> to mode 0
if a process's uid or gid has changed, but the /proc/<PID> directory itself was also set to mode 0. Assuming this doesn't open any security holes, open access to the /proc/<PID> directory for users other than root to read or search the directory. Reviewed by: des (back in February) MFC after: 3 weeks
This commit is contained in:
parent
6a7d5cb645
commit
e06dbd3229
@ -98,9 +98,12 @@ procfs_attr(PFS_ATTR_ARGS)
|
||||
PROC_LOCK_ASSERT(p, MA_OWNED);
|
||||
|
||||
/* XXX inefficient, split into separate functions */
|
||||
if (p->p_flag & P_SUGID)
|
||||
vap->va_mode = 0;
|
||||
else if (strcmp(pn->pn_name, "ctl") == 0 ||
|
||||
if (p->p_flag & P_SUGID) {
|
||||
if (pn->pn_type == pfstype_procdir)
|
||||
vap->va_mode = 0555;
|
||||
else
|
||||
vap->va_mode = 0;
|
||||
} else if (strcmp(pn->pn_name, "ctl") == 0 ||
|
||||
strcmp(pn->pn_name, "note") == 0 ||
|
||||
strcmp(pn->pn_name, "notepg") == 0)
|
||||
vap->va_mode = 0200;
|
||||
|
Loading…
x
Reference in New Issue
Block a user