From owner-freebsd-security Mon Aug 11 13:21:59 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id NAA27597 for security-outgoing; Mon, 11 Aug 1997 13:21:59 -0700 (PDT) Received: from server.local.sunyit.edu (A-T34.rh.sunyit.edu [150.156.210.241]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id NAA27582; Mon, 11 Aug 1997 13:21:54 -0700 (PDT) Received: from localhost (perlsta@localhost) by server.local.sunyit.edu (8.8.5/8.8.5) with SMTP id PAA11196; Mon, 11 Aug 1997 15:26:28 GMT X-Authentication-Warning: server.local.sunyit.edu: perlsta owned process doing -bs Date: Mon, 11 Aug 1997 15:26:28 +0000 (GMT) From: Alfred Perlstein X-Sender: perlsta@server.local.sunyit.edu To: =?KOI8-R?B?4c7E0sXKIP7F0s7P1w==?= cc: Sean Eric Fagan , FreeBSD-current , security@FreeBSD.ORG, Bruce Evans Subject: Re: procfs patch In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > > Gosh, that's what I had originally, and everyone didn't like *that*. > > (Frankly, neither did I.) > > Now I like Bruce's idea that exec call should fail if procfs memory is > open and setuid program is executed. why not have procfs check the UID of the file everytime an access is made VS the UID of the accessing program and denying access at that point? Alfred