Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I believe this should be DAC_READ_SEARCH.

I am trying to prevent all SYS_PTRACE from any domain on the system
but certain apps like dbus, consolekit, policykit, systemd-logger and
others like to look /proc/PID/exe to report the path of the executable
they are communicating with.  This causes lots of sys_ptrace access
being required for domains, that I do not believe need it.

They need DAC_READ_SEARCH because they are trying to read content that
is owned by a different UID.  The SYS_PTRACE stuff was put in to
prevent apps from reading process memory information stored in /proc.

I think this is a bug in the kernel.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk85hYIACgkQrlYvE4MpobPnsACcDXrEipv+rkdDa1/E4TwQdrtj
z9IAn2yCwDDdAvUIxiSugzMJQZUzswJ1
=Tfwm
-----END PGP SIGNATURE-----

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux