Somebody also needs to think about setuid root programs doing:
if (!vfork()) {setreuid(Someone_Else,Someone_Else); /* Stuff */; execve(...);}
While Someone_Else is busy sending SIGSTOPs to all their processes.
I know setuid programs _ought_ to be aware of security issues and
presumably not use vfork() here.
Is this change going to affect any of the existing ones?
-- Jamie
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/