Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Aug 1999 19:57:28 -0400 (EDT)
From:      Barrett Richardson <barrett@phoenix.aye.net>
To:        Warner Losh <imp@village.org>
Cc:        dg@root.com, dima@best.net, Gregory Sutter <gsutter@pobox.com>, security-officer@FreeBSD.ORG, freebsd-security@FreeBSD.ORG
Subject:   Re: [secure@FREEBSD.LUBLIN.PL: FreeBSD (and other BSDs?) local root explot] 
Message-ID:  <Pine.BSF.4.01.9908261944530.19521-100000@phoenix.aye.net>
In-Reply-To: <199908262348.RAA69353@harmony.village.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Thu, 26 Aug 1999, Warner Losh wrote:

> In message <Pine.BSF.4.01.9908261915120.13229-100000@phoenix.aye.net> Barrett Richardson writes:
> : On Digital Unix where core dumps are a big problem with setuid
> : binaries and the symlink issue, core dumps are disabled on
> : binaries that do not have a read bit set. This offers an "on
> : the fly" workaround.
> 
> Setuid binaries already don't dump core.
> 
> Warner
> 

What I didn't mention was the that a 'chmod -r xxxx' disables core
dumps on binaries whether setuid or not on Digital Unix (which will
happily dump core for a setuid binary -- I know, its silly).

-

Barrett



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9908261944530.19521-100000>