That's why the safest thing is to just go 32-bit in the kernel completely
and DON'T try to second guess what userland really meant.
> What about when an old server with 16-bit UIDs checks for root?
> This isn't just a kernel problem. I could imagine sudo giving out
> access to users 0x00001234, 0x10001234, and 0x0a001234.
If a high UID process calls sys_oldgetuid(), SIGKILL it. Harsh, but safe.
-Mitch
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/