Bugtraq mailing list archives
Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround
From: Lukasz Trabinski <lukasz () wsisiz edu pl>
Date: Fri, 14 Jul 2006 20:36:00 +0200 (CEST)
On Fri, 14 Jul 2006, Caveo Internet BV - Security wrote:
The most easy way to stop this vulnerability is this by sepcifying the core dump location echo /root/core > /proc/sys/kernel/core_pattern This specifies /root as core dump location which makes it unavailable for the local user.
Better solution add line to /etc/limits.conf * hard core 0 and set pam_limits in pam services. -- *[ Łukasz Trąbiński ]* SysAdmin @wsisiz.edu.pl
Current thread:
- rPSA-2006-0122-2 kernel Justin M. Forbes (Jul 13)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Hugo van der Kooij (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michael Shigorin (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Lukasz Trabinski (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michal Zalewski (Jul 18)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)