From: utzoo!decvax!harpo!utah-cs!sask!derek Newsgroups: net.unix-wizards Title: protect kmem and setgid programs Article-I.D.: sask.181 Posted: Fri Jan 7 10:18:56 1983 Received: Sat Jan 8 07:31:27 1983 If you protect kmem on your system and allow certain programs like ps to be setgid to read it, be sure to turn off the read permissions for ps. Otherwise, a user may start ps and issue the quit signal to dump core. The user then has a file which s/he owns but in with a group id which is able to read kmem. The user may copy any program onto the core image, turn on the setgid bit and presto - a program which can read kmem again. Derek Andrew U of Saskatchewan