Hi,

Can anyone enlighten me or sent me some pointers on the following
problems:
- if I gdb a core of an setuid program, will the code
  executed also be setuid?
- if I execute a program, will the memory in which the executable code is
  stored read/writable? (i.e. can I insert my own jumps?) I suspect setuid
  programs are read-only in memory?

(ps. non-root users)


Another thing (2.2.10 related):
- if I run a stupid malloc-ing and forking for-loop (as a non-privileged
  user) every process I try to execute dumps core; is this exploitable?
  Furthermore, with this little proggie anyone can "freeze" my system;
  i.e. it doesn't halt, but all my resources are eaten up (I can't even
  run kill being root) -- can I use another way besides PAM, running top
  from inittab or the Sysctl hack to solve this gently (maybe using some
  root/kernel memory or perhaps a way to `talk' to init directly??)

I hope this is not too much off-topic and I appreciate any answers,

xander van wiggen


-
Linux SMP list: FIRST see FAQ at http://www.irisa.fr/prive/mentre/smp-faq/
To Unsubscribe: send "unsubscribe linux-smp" to [EMAIL PROTECTED]

Reply via email to