Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jan 2000 14:32:38 -0200
From:      Joao Carlos Mendes Luis <jonny@jonny.eng.br>
To:        Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc:        Peter Wemm <peter@netplex.com.au>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: *BSD procfs vulnerability
Message-ID:  <20000128143238.B31737@roma.coe.ufrj.br>
In-Reply-To: <21984.948712872@critter.freebsd.dk>; from phk@critter.freebsd.dk on Mon, Jan 24, 2000 at 12:21:12PM %2B0100
References:  <20000124103441.D88561C03@overcee.netplex.com.au> <21984.948712872@critter.freebsd.dk>

next in thread | previous in thread | raw e-mail | index | archive | help
Somebody told me that Poul-Henning Kamp said:
> In message <20000124103441.D88561C03@overcee.netplex.com.au>, Peter Wemm writes
> :
> >Mike Tancsa wrote:
> >> 
> >> 
> >> What are the implications on unmounting procfs ?
> >
> >Under -current, practically nothing.  Under 3.x, ps(1) won't work right.
> >I'm not sure about gdb(1), it seems to use ptrace(2) these days.
> 
> I belive killall needs a minor fix to use ps(1)...

  What about substituting killall by skill (in ports) ?

					Jonny

-- 
João Carlos Mendes Luís			jonny@jonny.eng.br
  Networking Engineer			jcml@ieee.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000128143238.B31737>