From owner-freebsd-bugs Tue Jan 7 13:15:50 2003 Delivered-To: freebsd-bugs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8782637B401 for ; Tue, 7 Jan 2003 13:15:49 -0800 (PST) Received: from salmon.maths.tcd.ie (salmon.maths.tcd.ie [134.226.81.11]) by mx1.FreeBSD.org (Postfix) with SMTP id 6FA7543E4A for ; Tue, 7 Jan 2003 13:15:48 -0800 (PST) (envelope-from dwmalone@maths.tcd.ie) Received: from walton.maths.tcd.ie by salmon.maths.tcd.ie with SMTP id ; 7 Jan 2003 21:15:47 +0000 (GMT) Date: Tue, 7 Jan 2003 21:15:47 +0000 From: David Malone To: Mark Cc: freebsd-bugs@FreeBSD.org Subject: Re: bin/46838: security vulnerability in dump Message-ID: <20030107211547.GD82447@walton.maths.tcd.ie> References: <200301072050.h07Ko4Kj025064@freefall.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200301072050.h07Ko4Kj025064@freefall.freebsd.org> User-Agent: Mutt/1.3.25i Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Tue, Jan 07, 2003 at 12:50:04PM -0800, Mark wrote: > I realize running "umask 077" will prevent this problem. But I also believe > dump is a special case, as most individual programs do not create > world-readable files containing root's view of the filesystem data. Just about any command can create world readable files containing root's view of a filesystem: cp, tar, cat, dd. I'd also expect that people may use dump to create (say) group readable files which can be restored by those in group operator, or somesuch. If there's a general consensus for change, I'll go along with it - otherwise I'll close the PR as one of the many ways unix offers you to shoot yourself in the foot. David. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message