From owner-freebsd-security Wed Feb 5 14:39:05 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id OAA18263 for security-outgoing; Wed, 5 Feb 1997 14:39:05 -0800 (PST) Received: from root.com (implode.root.com [198.145.90.17]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id OAA18254 for ; Wed, 5 Feb 1997 14:39:03 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by root.com (8.7.6/8.6.5) with SMTP id OAA11880; Wed, 5 Feb 1997 14:38:55 -0800 (PST) Message-Id: <199702052238.OAA11880@root.com> X-Authentication-Warning: implode.root.com: Host localhost [127.0.0.1] didn't use HELO protocol To: tqbf@enteract.com cc: freebsd-security@freebsd.org, karl@mcs.net Subject: Re: While we're on the subject... In-reply-to: Your message of "Wed, 05 Feb 1997 16:31:19 CST." <199702052232.QAA12057@enteract.com> From: David Greenman Reply-To: dg@root.com Date: Wed, 05 Feb 1997 14:38:55 -0800 Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >> Programs that were once privileged might have read sensitive information >> into memory which could possibly be read out if some hole were exploited. > >Programs that were once privileged could become privileged again with one >system call. Right, that too. :-) -DG David Greenman Core-team/Principal Architect, The FreeBSD Project