#3910: +RTS options introduce a security problem for, e.g., setuid binaries
------------------------------------------+---------------------------------
  Reporter:  andersk                      |          Owner:  simonmar        
      Type:  bug                          |         Status:  closed          
  Priority:  normal                       |      Milestone:  7.0.2           
 Component:  Runtime System               |        Version:  7.1             
Resolution:  fixed                        |       Keywords:                  
  Testcase:                               |      Blockedby:                  
Difficulty:                               |             Os:  Unknown/Multiple
  Blocking:                               |   Architecture:  Unknown/Multiple
   Failure:  Incorrect result at runtime  |  
------------------------------------------+---------------------------------

Comment(by andersk):

 Replying to [comment:9 guest]:
 > just to turn on basic things like -N which should be reasonably safe.

 How do you know that passing -N to a setuid binary couldn’t be used to
 perform a denial of service attack by spawning many threads as root?

 But in general, it should never be up to the compiler to say how the
 ''program compiled with it'' interprets its command-line arguments and
 environment variables.  If the programmer wants to allow the user to
 change the program’s behavior in those ways, then the programmer needs to
 say so.

-- 
Ticket URL: <http://hackage.haskell.org/trac/ghc/ticket/3910#comment:10>
GHC <http://www.haskell.org/ghc/>
The Glasgow Haskell Compiler

_______________________________________________
Glasgow-haskell-bugs mailing list
[email protected]
http://www.haskell.org/mailman/listinfo/glasgow-haskell-bugs

Reply via email to