commit | a9712bc12c40c172e393f85a9b2ba8db4bf59509 | [log] [tgz] |
---|---|---|
author | Al Viro <viro@zeniv.linux.org.uk> | Wed Mar 23 15:52:50 2011 -0400 |
committer | Al Viro <viro@zeniv.linux.org.uk> | Wed Mar 23 17:01:18 2011 -0400 |
tree | c40217e028ae937da7ad94e249e2247191ffcc8f | |
parent | 198214a7ee50375fa71a65e518341980cfd4b2f0 [diff] |
deal with races in /proc/*/{syscall,stack,personality} All of those are rw-r--r-- and all are broken for suid - if you open a file before the target does suid-root exec, you'll be still able to access it. For personality it's not a big deal, but for syscall and stack it's a real problem. Fix: check that task is tracable for you at the time of read(). Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>