Date: Mon, 13 Oct 1997 12:20:02 -0700 (PDT) From: Nate Williams <nate@mt.sri.com> To: freebsd-bugs Subject: Re: kern/4755: coredump refusal of setuid programs too restrictive Message-ID: <199710131920.MAA16648@hub.freebsd.org>
index | next in thread | raw e-mail
The following reply was made to PR kern/4755; it has been noted by GNATS.
From: Nate Williams <nate@mt.sri.com>
To: pst@shockwave.com
Cc: FreeBSD-gnats-submit@freebsd.org, security-officer@freebsd.org,
bde@freebsd.org, phk@freebsd.org
Subject: Re: kern/4755: coredump refusal of setuid programs too restrictive
Date: Mon, 13 Oct 1997 13:09:41 -0600 (MDT)
Paul Traina writes:
>
> >Number: 4755
> >Category: kern
> >Synopsis: we should allow coredumps of setuid code if uid==0
> >Confidential: no
> >Severity: non-critical
> >Priority: high
> >Responsible: freebsd-bugs
> >State: open
> >Class: sw-bug
> >Submitter-Id: current-users
> >Arrival-Date: Mon Oct 13 10:10:01 PDT 1997
> >Last-Modified:
> >Originator: Paul Traina
> >Organization:
> Juniper Networks
> >Release: FreeBSD 3.0-CURRENT i386
> >Environment:
>
> This is relevant in 2.2.x and 3.0.
>
> >Description:
>
> Currently, if a program is setuid, we don't take a core, period.
> This makes it very difficult to debug certain types of problems.
>
> >How-To-Repeat:
>
> Dump core in a setuid program invoked by root.
>
> >Fix:
>
> The code should be changed to check the uid (maybe saved uid?) of
> the current invoker and remove the restriction if that uid is 0.
I think the only safe fix to have use a sysctl that enables it. There
are too many things that would still 'unsafely' dump core with any kind
of check you can come up with. By allowing it to be disabled easily by
a root user, you allow a developer/user to allow core dumps, with the
knowledge that the system is no longer secure.
Nate
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199710131920.MAA16648>
