On Sun, 25 Jul 1999 21:50:55 MST, [EMAIL PROTECTED] wrote: > Yes, but /if/ KTRACE is present, today's code allows you to bypass > the lack of read permissions on an executable. That shouldn't be > allowed. The current behaviour could be regarded as a security > hole actually :). This doesn't look right. If I can execute a binary, I can have the system allocate memory to me and but the binary image in it. It's my memory. :-) Ciao, Sheldon. To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
- deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Greg Lehey
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Sheldon Hearn
- Re: deny ktrace without read permissions? Warner Losh
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Sean Eric Fagan
- Re: deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Sean Eric Fagan
- Re: deny ktrace without read permiss... Warner Losh
- yet more ways to attack executing binarie... Robert Watson
- Re: yet more ways to attack executin... Chris Costello

