Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 19 Feb 1997 14:05:00 +1100 (EST)
From:      "Daniel O'Callaghan" <danny@panda.hilink.com.au>
To:        freebsd-hackers@freebsd.org
Cc:        gnat@frii.com
Subject:   Core dumps in suid processes (again)
Message-ID:  <Pine.BSF.3.91.970219135715.8268Y-100000@panda.hilink.com.au>

next in thread | raw e-mail | index | archive | help

This was on BUGTRAQ.  Given that from recent discussions FreeBSD only knows
its current e/r uids, rather than that is has been suid,  I'm not sure of 
the correct answer to the question below.

Can someone please fill in the blanks.

Danny

---------- Forwarded message ----------
Date: Tue, 18 Feb 1997 19:31:08 -0700 (MST)
From: gnat@frii.com
To: Daniel O'Callaghan <danny@panda.hilink.com.au>
Subject: Re: FreeBSD,rlogin and coredumps.

gnat@frii.com writes:

[ WTTEO: I can read encrypted password file entries after killing my screen 
session on FreeBSD 2.1.5 ]

Daniel O'Callaghan writes:
> Upgrade to 2.1.6 (preferably, wait a few days for 2.1.7)  In OS versions 
> 2.1.6 and greater suid programs will not dump core.

Will that work with screen, where the program is setuid root but runs
(and is kill -11 able) as me?  I guess I mean, does the
has-been-setuid flag keep its state even when euid==ruid?

Nat





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.970219135715.8268Y-100000>