From: utzoo!decvax!harpo!utah-cs!sask!derek
Newsgroups: net.unix-wizards
Title: protect kmem and setgid programs
Article-I.D.: sask.181
Posted: Fri Jan  7 10:18:56 1983
Received: Sat Jan  8 07:31:27 1983

If you protect kmem on your system and allow certain programs like ps
to be setgid to read it, be sure to turn off the read permissions for
ps.  Otherwise, a user may start ps and issue the quit signal to dump
core.  The user then has a file which s/he owns but in with a group id
which is able to read kmem.  The user may copy any program onto the 
core image, turn on the setgid bit and presto - a program which can 
read kmem again.

Derek Andrew
U of Saskatchewan