From owner-freebsd-hackers Sun Jul 25 22:41:16 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from axl.noc.iafrica.com (axl.noc.iafrica.com [196.31.1.175]) by hub.freebsd.org (Postfix) with ESMTP id 50F4E15291; Sun, 25 Jul 1999 22:41:06 -0700 (PDT) (envelope-from sheldonh@axl.noc.iafrica.com) Received: from sheldonh (helo=axl.noc.iafrica.com) by axl.noc.iafrica.com with local-esmtp (Exim 3.02 #1) id 118dVZ-000Gs4-00; Mon, 26 Jul 1999 07:41:05 +0200 From: Sheldon Hearn To: jkoshy@FreeBSD.org Cc: Nate Williams , freebsd-hackers@freebsd.org Subject: Re: deny ktrace without read permissions? In-reply-to: Your message of "Sun, 25 Jul 1999 21:50:55 MST." <199907260450.VAA10559@freefall.freebsd.org> Date: Mon, 26 Jul 1999 07:41:05 +0200 Message-ID: <64855.932967665@axl.noc.iafrica.com> Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Sun, 25 Jul 1999 21:50:55 MST, jkoshy@FreeBSD.org wrote: > Yes, but /if/ KTRACE is present, today's code allows you to bypass > the lack of read permissions on an executable. That shouldn't be > allowed. The current behaviour could be regarded as a security > hole actually :). This doesn't look right. If I can execute a binary, I can have the system allocate memory to me and but the binary image in it. It's my memory. :-) Ciao, Sheldon. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message