croick added a comment.

  In D11236#239055 <https://phabricator.kde.org/D11236#239055>, @sitter wrote:
  
  > Maybe I am missing something here but wouldn't this allow any application 
to get ptrace access?
  >
  > e.g. if a malicious program watches /tmp/kcrash_*, then writes its own pid 
to a new socket before kcrash writes the debugger's... now the malicious 
program has ptrace access.
  
  
  That's a valid point. In the updated revision the peer PID is checked and 
must match the one of DrKonqi, before `prctl` is called.
  
  > I also think *printf isn't save to call in a signal handler. Not sure about 
atoi.
  
  `atoi` seems to be safe, `(f)printf` isn't indeed. Nevertheless it's used in 
the existing code already. Maybe that should be addressed in a different patch?
  
  Thank you for your remarks!

REPOSITORY
  R285 KCrash

REVISION DETAIL
  https://phabricator.kde.org/D11236

To: croick, #frameworks
Cc: sitter, michaelh, ngraham

Reply via email to