Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Jul 1999 22:13:33 -0700 (PDT)
From:      Sean Eric Fagan <sef@kithrup.com>
To:        jkoshy@FreeBSD.ORG
Cc:        hackers@FreeBSD.ORG
Subject:   Re: deny ktrace without read permissions? 
Message-ID:  <199907260513.WAA08897@kithrup.com>
References:  Your message of "Sat, 24 Jul 1999 11:24:39 CST." <199907241724.LAA13835@mt.sri.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In article <199907260450.VAA10559.kithrup.freebsd.hackers@freefall.freebsd.org> you write:
>Yes, but /if/ KTRACE is present, today's code allows you to bypass
>the lack of read permissions on an executable.  That shouldn't be
>allowed.  The current behaviour could be regarded as a security
>hole actually :).

No more so than core dumps do.

I vote strongly against this change.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907260513.WAA08897>