Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Jul 1999 07:41:05 +0200
From:      Sheldon Hearn <sheldonh@uunet.co.za>
To:        jkoshy@FreeBSD.org
Cc:        Nate Williams <nate@mt.sri.com>, freebsd-hackers@freebsd.org
Subject:   Re: deny ktrace without read permissions? 
Message-ID:  <64855.932967665@axl.noc.iafrica.com>
In-Reply-To: Your message of "Sun, 25 Jul 1999 21:50:55 MST." <199907260450.VAA10559@freefall.freebsd.org> 

next in thread | previous in thread | raw e-mail | index | archive | help


On Sun, 25 Jul 1999 21:50:55 MST, jkoshy@FreeBSD.org wrote:

> Yes, but /if/ KTRACE is present, today's code allows you to bypass
> the lack of read permissions on an executable.  That shouldn't be
> allowed.  The current behaviour could be regarded as a security
> hole actually :).

This doesn't look right. If I can execute a binary, I can have the
system allocate memory to me and but the binary image in it. It's my
memory. :-)

Ciao,
Sheldon.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?64855.932967665>