+50
−19
Loading
Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more
All of those are rw-r--r-- and all are broken for suid - if you open
a file before the target does suid-root exec, you'll be still able
to access it. For personality it's not a big deal, but for syscall
and stack it's a real problem.
Fix: check that task is tracable for you at the time of read().
Signed-off-by:
Al Viro <viro@zeniv.linux.org.uk>