kernelnewbies.kernelnewbies.org archive mirror
 help / color / mirror / Atom feed
* sticky bits in /proc etc
@ 2020-06-10 14:24 jim.cromie
  2020-06-11  3:37 ` Valdis Klētnieks
  0 siblings, 1 reply; 3+ messages in thread
From: jim.cromie @ 2020-06-10 14:24 UTC (permalink / raw)
  To: kernelnewbies

Id like to ask about a possible new use for file and directory sticky bits,
or setuid bits, to address the root-only use of /proc (etc) files

this needs root

  echo module kvm +p > /proc/dynamic_debug/control

how about this ?

cat root-owned-readonly-file  > /proc/dynamic_debug/control

the root-owned-file can define a fixed set of dprintk enablements,
and since its ro, its contents are controlled.

is there some combination of special-bits on the source (ro root owned)
and destination (root owned)
that could safely allow joe-user to cat that file into control ?

If it could fit here, it might then be a general workaround to root-shell access
for /proc /sys manipulations

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-06-11 15:10 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-06-10 14:24 sticky bits in /proc etc jim.cromie
2020-06-11  3:37 ` Valdis Klētnieks
2020-06-11 15:07   ` jim.cromie

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).