On Sun, Dec 16, 2012 at 04:02:03PM +0400, tux2...@front.ru wrote:
> Not, this permissions saved for all users for later, check please.

... and that's why it's bogus.  umask of whoever had done lookup for
/proc/<something> affects everybody else.  For as long as the thing stays
in dcache.  At which point it's up for grabs (in that sense) again.
Do (umask 777; ls -l /proc) with your kernel and watch the results.
Note that you don't need to be root to cause that - anyone can do it.

Realize that dentries and inodes in /proc/<pid>/* are created on demand
whenever somebody does a lookup.  So running ps(1) suddenly makes you
a creator of a bunch of those.  Unless somebody else had done ps(1) (or
ls -l /proc, or...) first.  Basing any security decisions on _that_ is
insane.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to