Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Jan 2000 12:21:12 +0100
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Peter Wemm <peter@netplex.com.au>
Cc:        Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: *BSD procfs vulnerability 
Message-ID:  <21984.948712872@critter.freebsd.dk>
In-Reply-To: Your message of "Mon, 24 Jan 2000 18:34:41 %2B0800." <20000124103441.D88561C03@overcee.netplex.com.au> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <20000124103441.D88561C03@overcee.netplex.com.au>, Peter Wemm writes
:
>Mike Tancsa wrote:
>> 
>> 
>> What are the implications on unmounting procfs ?
>
>Under -current, practically nothing.  Under 3.x, ps(1) won't work right.
>I'm not sure about gdb(1), it seems to use ptrace(2) these days.

I belive killall needs a minor fix to use ps(1)...

--
Poul-Henning Kamp             FreeBSD coreteam member
phk@FreeBSD.ORG               "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?21984.948712872>