Date: Fri, 28 Jan 2000 14:32:38 -0200 From: Joao Carlos Mendes Luis <jonny@jonny.eng.br> To: Poul-Henning Kamp <phk@critter.freebsd.dk> Cc: Peter Wemm <peter@netplex.com.au>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: *BSD procfs vulnerability Message-ID: <20000128143238.B31737@roma.coe.ufrj.br> In-Reply-To: <21984.948712872@critter.freebsd.dk>; from phk@critter.freebsd.dk on Mon, Jan 24, 2000 at 12:21:12PM %2B0100 References: <20000124103441.D88561C03@overcee.netplex.com.au> <21984.948712872@critter.freebsd.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
Somebody told me that Poul-Henning Kamp said: > In message <20000124103441.D88561C03@overcee.netplex.com.au>, Peter Wemm writes > : > >Mike Tancsa wrote: > >> > >> > >> What are the implications on unmounting procfs ? > > > >Under -current, practically nothing. Under 3.x, ps(1) won't work right. > >I'm not sure about gdb(1), it seems to use ptrace(2) these days. > > I belive killall needs a minor fix to use ps(1)... What about substituting killall by skill (in ports) ? Jonny -- João Carlos Mendes Luís jonny@jonny.eng.br Networking Engineer jcml@ieee.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000128143238.B31737>