/proc filesystem security question...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi there,

Due to a problem I've had in a program, I pose the question described below.

I have an application that uses the proc filesystem to gather
information about the local network interfaces. Those functions check
proc/net for _not_ being a symlink; this could possibly mean a
rerouted directory (with malicious intentions).

Allthough, as of Linux-2.6.25, the proc/net directory has been
assigned being a pointer to proc/self/net and my program fails. I now
either have to remove the link-check or alternatively implement my
function (by means of IOCTL's for example).

I was wondering; isn't it dangerous to do this? I'm not sure whether
it is actually doable to reroute proc/* directories/files...What's
your thought?

Thanks in advance,

Kris

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux