Bugtraq mailing list archives
Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround
From: Hugo van der Kooij <hvdkooij () vanderkooij org>
Date: Fri, 14 Jul 2006 21:08:46 +0200 (CEST)
On Fri, 14 Jul 2006, Caveo Internet BV - Security wrote:
The most easy way to stop this vulnerability is this by sepcifying the core dump location echo /root/core > /proc/sys/kernel/core_pattern This specifies /root as core dump location which makes it unavailable for the local user.
This would be just shifting problems. /root is usually not that big. So you end up with a core dump filling up your root disk. Not a pretty sight I might add. Either disable coredumps or send them to a place with plenty of diskspace left and protect that one from prying eyes. Hugo. -- I hate duplicates. Just reply to the relevant mailinglist. hvdkooij () vanderkooij org http://hvdkooij.xs4all.nl/ Don't meddle in the affairs of magicians, for they are subtle and quick to anger.
Current thread:
- rPSA-2006-0122-2 kernel Justin M. Forbes (Jul 13)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Hugo van der Kooij (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michael Shigorin (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Lukasz Trabinski (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michal Zalewski (Jul 18)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)