diff options
author | Kalesh Singh <kaleshsingh@google.com> | 2022-05-09 17:34:28 -0700 |
---|---|---|
committer | akpm <akpm@linux-foundation.org> | 2022-05-09 17:34:28 -0700 |
commit | 1927e498aee1757b3df755a194cbfc5cc0f2b663 (patch) | |
tree | 7b4c291c5734c549f4d3072b8f117e5f5b27e664 /arch/arm64/mm/ioremap.c | |
parent | 7d1e6496616275f3830e2f2f91fa69a66953e95b (diff) |
procfs: prevent unprivileged processes accessing fdinfo dir
The file permissions on the fdinfo dir from were changed from
S_IRUSR|S_IXUSR to S_IRUGO|S_IXUGO, and a PTRACE_MODE_READ check was added
for opening the fdinfo files [1]. However, the ptrace permission check
was not added to the directory, allowing anyone to get the open FD numbers
by reading the fdinfo directory.
Add the missing ptrace permission check for opening the fdinfo directory.
[1] https://lkml.kernel.org/r/20210308170651.919148-1-kaleshsingh@google.com
Link: https://lkml.kernel.org/r/20210713162008.1056986-1-kaleshsingh@google.com
Fixes: 7bc3fa0172a4 ("procfs: allow reading fdinfo with PTRACE_MODE_READ")
Signed-off-by: Kalesh Singh <kaleshsingh@google.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Eric W. Biederman <ebiederm@xmission.com>
Cc: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Suren Baghdasaryan <surenb@google.com>
Cc: Hridya Valsaraju <hridya@google.com>
Cc: Jann Horn <jannh@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Diffstat (limited to 'arch/arm64/mm/ioremap.c')
0 files changed, 0 insertions, 0 deletions