From 3513350de63079505a1ad142942cc50ae8e511dc Mon Sep 17 00:00:00 2001 From: Michael Pratt Date: Tue, 9 Apr 2019 12:51:13 -0700 Subject: [PATCH] Specify /proc explicitly --- content/docs/architecture_guide/security.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index fc2a7bf7a..93723727c 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -37,8 +37,8 @@ might involve some combination of the following: 1. Racing with multiple threads in order to hit specific code paths. For example, for the [Dirty Cow][dirtycow] privilege escalation bug, an -application would open a specific file in proc or use a specific `ptrace` system -call, and use multiple threads in order to trigger a race condition when +application would open a specific file in `/proc` or use a specific `ptrace` +system call, and use multiple threads in order to trigger a race condition when touching a fresh page of memory. The attacker then gains control over a page of memory belonging to the system. With additional privileges or access to privileged data in the kernel, an attacker will often be able to employ