Files
ubports_kernel_google_msm/fs/proc
Al Viro a9712bc12c deal with races in /proc/*/{syscall,stack,personality}
All of those are rw-r--r-- and all are broken for suid - if you open
a file before the target does suid-root exec, you'll be still able
to access it.  For personality it's not a big deal, but for syscall
and stack it's a real problem.

Fix: check that task is tracable for you at the time of read().

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2011-03-23 17:01:18 -04:00
..
2011-02-15 07:34:16 -08:00
2011-03-08 02:22:27 -05:00
2011-01-13 08:03:16 -08:00
2011-01-13 08:03:17 -08:00
2011-01-13 17:32:43 -08:00
2011-01-13 17:32:43 -08:00
2010-10-29 04:17:01 -04:00