Date: Mon, 26 Jul 1999 07:41:05 +0200 From: Sheldon Hearn <sheldonh@uunet.co.za> To: jkoshy@FreeBSD.org Cc: Nate Williams <nate@mt.sri.com>, freebsd-hackers@freebsd.org Subject: Re: deny ktrace without read permissions? Message-ID: <64855.932967665@axl.noc.iafrica.com> In-Reply-To: Your message of "Sun, 25 Jul 1999 21:50:55 MST." <199907260450.VAA10559@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 25 Jul 1999 21:50:55 MST, jkoshy@FreeBSD.org wrote: > Yes, but /if/ KTRACE is present, today's code allows you to bypass > the lack of read permissions on an executable. That shouldn't be > allowed. The current behaviour could be regarded as a security > hole actually :). This doesn't look right. If I can execute a binary, I can have the system allocate memory to me and but the binary image in it. It's my memory. :-) Ciao, Sheldon. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?64855.932967665>