/0x90
Alexey Dobriyan 于2018年12月14日周五 下午11:44写道:
>
> On Wed, Dec 05, 2018 at 03:26:04PM +0800, 程洋 wrote:
> > Anyone who can review my patch?
> >
> > 程洋 于2018年11月30日周五 上午10:34写道:
> > >
> > > Here is an article illustrates the details.
> > > https:/
@Nick. Would mind giving this patch an "Acked-by"?
This issue causes any Android who uses latest kernel cannot mount proc
with "hidepid=2" option. Which causes problems
程洋 于2018年12月5日周三 下午3:26写道:
>
> Anyone who can review my patch?
>
> 程洋 于2018年11月30日周五 上午10:
Anyone who can review my patch?
程洋 于2018年11月30日周五 上午10:34写道:
>
> Here is an article illustrates the details.
> https://medium.com/@topjohnwu/from-anime-game-to-android-system-security-vulnerability-9b955a182f20
>
> And There is a similar fix on kernel-4.4:
> https://git.kernel
roc" in the runtime(by add some logs). And even it is
called, it doesn't clean sb->s_root. Until now, i didn't see any
deeper issue. Maybe it's true that we should handle proc filesystem
specially.
If anyone who is sure about the functionality of sb->s_root and think
it shoul
his considered to be security sensitive? I can guess, but
I'd like to know your reasoning.
A: See the article above. It's part of Android sanbox.
程洋 于2018年11月30日周五 上午10:34写道:
>
> Here is an article illustrates the details.
> https://medium.com/@topjohnwu/from-anime-game-to-a
Here is an article illustrates the details.
https://medium.com/@topjohnwu/from-anime-game-to-android-system-security-vulnerability-9b955a182f20
And There is a similar fix on kernel-4.4:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=99663be772c827b8f5f594fe87eb4807be
6 matches
Mail list logo