Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Oct 1997 10:08:18 -0700 (PDT)
From:      Paul Traina <pst@Shockwave.COM>
To:        FreeBSD-gnats-submit@FreeBSD.ORG
Cc:        security-officer@FreeBSD.ORG, bde@FreeBSD.ORG, phk@FreeBSD.ORG
Subject:   kern/4755: coredump refusal of setuid programs too restrictive
Message-ID:  <199710131708.KAA08172@precipice.shockwave.com>
Resent-Message-ID: <199710131710.KAA07599@hub.freebsd.org>

index | next in thread | raw e-mail


>Number:         4755
>Category:       kern
>Synopsis:       we should allow coredumps of setuid code if uid==0
>Confidential:   no
>Severity:       non-critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          open
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Oct 13 10:10:01 PDT 1997
>Last-Modified:
>Originator:     Paul Traina
>Organization:
Juniper Networks
>Release:        FreeBSD 3.0-CURRENT i386
>Environment:

This is relevant in 2.2.x and 3.0.

>Description:

Currently, if a program is setuid, we don't take a core, period.
This makes it very difficult to debug certain types of problems.

>How-To-Repeat:

Dump core in a setuid program invoked by root.

>Fix:
	
The code should be changed to check the uid (maybe saved uid?) of
the current invoker and remove the restriction if that uid is 0.
>Audit-Trail:
>Unformatted:


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199710131708.KAA08172>