From owner-cvs-all Tue Jul 4 6:21:27 2000 Delivered-To: cvs-all@freebsd.org Received: from volatile.chemicals.tacorp.com (ci391991-a.grnvle1.sc.home.com [24.9.31.75]) by hub.freebsd.org (Postfix) with ESMTP id ED41D37B844; Tue, 4 Jul 2000 06:21:18 -0700 (PDT) (envelope-from morganw@chemicals.tacorp.com) Received: (from morganw@localhost) by volatile.chemicals.tacorp.com (8.9.3/8.9.3) id JAA08992; Tue, 4 Jul 2000 09:21:16 -0400 (EDT) (envelope-from morganw) Date: Tue, 4 Jul 2000 09:21:15 -0400 (EDT) From: Wes Morgan To: Brian Feldman Cc: cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG Subject: Re: cvs commit: src/crypto/openssh sshd.c In-Reply-To: <200007040646.IAA67137@internat.freebsd.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I hope that there is no way ever in 1e6 years that someone will be able to subvert /proc/curproc and get sshd to execute the program of his choice as root when it gets HUP'd. I can't think of any way possible, but there are 6 billion people out there besides me. On Tue, 4 Jul 2000, Brian Feldman wrote: > green 2000/07/04 08:46:10 SAST > > FreeBSD International Crypto Repository > > Modified files: > crypto/openssh sshd.c > Log: > MFF: > Allow restarting on SIGHUP when the full path was not given as argv[0]. > We do have /proc/curproc/file :) > > Revision Changes Path > 1.13 +2 -1 src/crypto/openssh/sshd.c > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe cvs-all" in the body of the message > -- _ __ ___ ____ ___ ___ ___ Wesley N Morgan _ __ ___ | _ ) __| \ wesleymorgan@home.com _ __ | _ \._ \ |) | FreeBSD: The Power To Serve _ |___/___/___/ Hi! I'm a .signature virus! Copy me into your ~/.signature to help me spread! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message