Searched hist:a9712bc12c40c172e393f85a9b2ba8db4bf59509 (Results 1 – 1 of 1) sorted by relevance
/openbmc/linux/fs/proc/ |
H A D | base.c | diff a9712bc12c40c172e393f85a9b2ba8db4bf59509 Wed Mar 23 14:52:50 CDT 2011 Al Viro <viro@zeniv.linux.org.uk> deal with races in /proc/*/{syscall,stack,personality}
All of those are rw-r--r-- and all are broken for suid - if you open a file before the target does suid-root exec, you'll be still able to access it. For personality it's not a big deal, but for syscall and stack it's a real problem.
Fix: check that task is tracable for you at the time of read().
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
|