From owner-freebsd-bugs Thu Dec 24 15:30:29 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA04533 for freebsd-bugs-outgoing; Thu, 24 Dec 1998 15:30:29 -0800 (PST) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA04524; Thu, 24 Dec 1998 15:30:17 -0800 (PST) (envelope-from newton@FreeBSD.org) From: Mark Newton Received: (from newton@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id PAA14909; Thu, 24 Dec 1998 15:30:07 -0800 (PST) Date: Thu, 24 Dec 1998 15:30:07 -0800 (PST) Message-Id: <199812242330.PAA14909@freefall.freebsd.org> To: newton@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, newton@FreeBSD.ORG Subject: Re: kern/9183 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: chroot(2) can be broken by the superuser. this patch disables chroot() for processes which have already been chroot()'ed Responsible-Changed-From-To: freebsd-bugs->newton Responsible-Changed-By: newton Responsible-Changed-When: Thu Dec 24 15:28:41 PST 1998 Responsible-Changed-Why: I submitted the patch; I'll do the worrying about whether it's worthwhile during the discussion about whether it should be included. See discussion on freebsd-security. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message