Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752018AbaGTLGc (ORCPT ); Sun, 20 Jul 2014 07:06:32 -0400 Received: from mail-vc0-f174.google.com ([209.85.220.174]:41940 "EHLO mail-vc0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751212AbaGTLGb (ORCPT ); Sun, 20 Jul 2014 07:06:31 -0400 MIME-Version: 1.0 In-Reply-To: <87fvhwxps6.fsf@igel.home> References: <87lhrpayl4.fsf@igel.home> <87fvhwxps6.fsf@igel.home> Date: Sun, 20 Jul 2014 13:06:30 +0200 Message-ID: Subject: Re: ls -l /proc/1/exe -> Permission denied From: Richard Weinberger To: Andreas Schwab Cc: Joakim Tjernlund , LKML Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jul 20, 2014 at 12:55 PM, Andreas Schwab wrote: > Joakim Tjernlund writes: > >> Andreas Schwab wrote on 2014/07/19 22:21:59: >>> >>> Joakim Tjernlund writes: >>> >>> > Trying to real /proc//exe I noticed I could not read links not >>> > belonging to my user such as: >>> > jocke > ls -l /proc/1/exe >>> > ls: cannot read symbolic link /proc/1/exe: Permission >> denied >>> > >>> > Is this expected? >>> >>> Yes. This information is considered private. >> >> I don't understand why though. > > It would allow bypassing access restrictions. Do you have an example? I'm asking because an attacker could make any symlink as he wants to. A ln -s /etc/shadow lala still does not give me access to shadow... -- Thanks, //richard -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/