Date: Mon, 24 Jan 2000 12:21:12 +0100 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: Peter Wemm <peter@netplex.com.au> Cc: Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: *BSD procfs vulnerability Message-ID: <21984.948712872@critter.freebsd.dk> In-Reply-To: Your message of "Mon, 24 Jan 2000 18:34:41 %2B0800." <20000124103441.D88561C03@overcee.netplex.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <20000124103441.D88561C03@overcee.netplex.com.au>, Peter Wemm writes : >Mike Tancsa wrote: >> >> >> What are the implications on unmounting procfs ? > >Under -current, practically nothing. Under 3.x, ps(1) won't work right. >I'm not sure about gdb(1), it seems to use ptrace(2) these days. I belive killall needs a minor fix to use ps(1)... -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." FreeBSD -- It will take a long time before progress goes too far! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?21984.948712872>