Quoting Andrew G. Morgan (mor...@kernel.org): > > It breaks down because, currently, users with nonzero pI have no > > direct ability to wield the capabilities. That means that every > > single binary with fI bits set needs to be as careful as a setuid-root > > binary to avoid leaking privilege to the caller. (Obviously, binaries > > with fP set need to be careful. IMO binaries with only fI set should > > not need to exercise any particular care to defend themselves from > > their callers.) > > True.
Uh, I disagree. Not true. (I suspect Andrew meant True to the first two sentences, not the last parenthesized one?) -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/