Date: Thu, 26 Aug 1999 19:25:33 -0400 (EDT) From: Barrett Richardson <barrett@phoenix.aye.net> To: Warner Losh <imp@village.org> Cc: dg@root.com, dima@best.net, Gregory Sutter <gsutter@pobox.com>, security-officer@FreeBSD.ORG, freebsd-security@FreeBSD.ORG Subject: Re: [secure@FREEBSD.LUBLIN.PL: FreeBSD (and other BSDs?) local root explot] Message-ID: <Pine.BSF.4.01.9908261915120.13229-100000@phoenix.aye.net> In-Reply-To: <199908262213.QAA68314@harmony.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 26 Aug 1999, Warner Losh wrote: > In message <199908262056.NAA03100@implode.root.com> David Greenman writes: > : Yikes, you're not proposing that we disable following of symlinks that > : point to binaries, are you? > > No. Just following symlinks when dumping core. > > Warner > On Digital Unix where core dumps are a big problem with setuid binaries and the symlink issue, core dumps are disabled on binaries that do not have a read bit set. This offers an "on the fly" workaround. - Barrett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9908261915120.13229-100000>