On Mon, Jul 26, 1999, Nate Williams wrote:
> > > LD_LIBRARY_PATH, LD_PRELOAD and LD_DEBUG are ignored for setuid executables
> > > in FreeBSD.
> > 
> > But the point being made is that they are not ignored for executables
> > which have no read access.  And from there, read access can be gained,
> > because at that point, you have code running in the process's address
> > space.
> 
> That's right.  In other words, there really is no way of protecting
> executable files from being read if someone is motivated enough.
> 
> And, in an open-source OS like FreeBSD, it's not a viable solution in
> any case....

   The only option, as I've mentined previously in this thread,
that I can think of, would be to have an option when building
various linker code to disable searching in $LD_LIBRARY_PATH if
the library being looked for is in the standard library paths.

-- 
|Chris Costello <[EMAIL PROTECTED]>
|Is reading in the bathroom considered Multi-Tasking?
`----------------------------------------------------


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to