Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753998AbZJYTM3 (ORCPT ); Sun, 25 Oct 2009 15:12:29 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753660AbZJYTM2 (ORCPT ); Sun, 25 Oct 2009 15:12:28 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:56977 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751553AbZJYTM2 (ORCPT ); Sun, 25 Oct 2009 15:12:28 -0400 Date: Sun, 25 Oct 2009 07:30:18 +0100 From: Pavel Machek To: David Wagner Cc: linux-kernel@vger.kernel.org Subject: Re: SECURITY PROBLEM: filesystem permiossion bypass on FD already opened Message-ID: <20091025063017.GA1480@ucw.cz> References: <4AE20B6F.4060606@ntd.homelinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 557 Lines: 15 > On the other hand, the /proc attack that Pavel explains *is* a > security problem. But that's different. I'm glad I convinced at least someone :-). Thanks, Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/