Date: Thu, 26 Aug 1999 19:57:28 -0400 (EDT) From: Barrett Richardson <barrett@phoenix.aye.net> To: Warner Losh <imp@village.org> Cc: dg@root.com, dima@best.net, Gregory Sutter <gsutter@pobox.com>, security-officer@FreeBSD.ORG, freebsd-security@FreeBSD.ORG Subject: Re: [secure@FREEBSD.LUBLIN.PL: FreeBSD (and other BSDs?) local root explot] Message-ID: <Pine.BSF.4.01.9908261944530.19521-100000@phoenix.aye.net> In-Reply-To: <199908262348.RAA69353@harmony.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 26 Aug 1999, Warner Losh wrote: > In message <Pine.BSF.4.01.9908261915120.13229-100000@phoenix.aye.net> Barrett Richardson writes: > : On Digital Unix where core dumps are a big problem with setuid > : binaries and the symlink issue, core dumps are disabled on > : binaries that do not have a read bit set. This offers an "on > : the fly" workaround. > > Setuid binaries already don't dump core. > > Warner > What I didn't mention was the that a 'chmod -r xxxx' disables core dumps on binaries whether setuid or not on Digital Unix (which will happily dump core for a setuid binary -- I know, its silly). - Barrett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9908261944530.19521-100000>