Re: Minor PTRACE security bug

Martin Mares (mj@ucw.cz)
Tue, 15 Sep 1998 09:58:26 +0200


> Maybe LD_PRELOAD should also not be permitted if you have not got read
> permission to the file you are executing? There could quite easily be
> something more revealing that you can do with this -- eg, copy the entire
> memory space of the program to a file.

Does it really make sense to protect sensitive data by making them executable,
but not readable? It violates the basic "process running with euid equal to my
euid -> I can do everything with it" rule and thus there are zillions of ways
how to access such process's address space (ptrace, LD_PRELOAD, /proc ...).

Have a nice fortnight

-- 
Martin `MJ' Mares   <mj@ucw.cz>   http://atrey.karlin.mff.cuni.cz/~mj/
Faculty of Math and Physics, Charles University, Prague, Czech Rep., Earth
"Windows Error: 007 - System price error.  Inadequate money spent."

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/