Skip to content

Restrict reading old_addr and new_addr to root only#467

Merged
sjenning merged 1 commit intodynup:masterfrom
flaming-toast:sysfs_perm
Jan 5, 2015
Merged

Restrict reading old_addr and new_addr to root only#467
sjenning merged 1 commit intodynup:masterfrom
flaming-toast:sysfs_perm

Conversation

@flaming-toast
Copy link
Contributor

As mentioned on the live-patching mailing list, it is probably a good idea to restrict reading old_addr and new_addr to root only, to prevent unprivileged users from gaining information about the kernel's address space.

That being said, we could also take this time to double check current permissions in sysfs. Should checksum and enabled be readable by root only as well? Should the perms on the kpatch directory in sysfs be more stringent?

@jpoimboe
Copy link
Member

@flaming-toast Thanks for staying on top of it. We are actually thinking about removing old_addr and new_addr from sysfs altogether.

I'd rather leave everything else (checksum, enabled) world-readable for now. They don't have any addresses in them so I think they're ok.

👍 with the understanding that we may be ripping out this code anyway :-)

sjenning added a commit that referenced this pull request Jan 5, 2015
Restrict reading old_addr and new_addr to root only
@sjenning sjenning merged commit 97c2bea into dynup:master Jan 5, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants