Bugtraq mailing list archives
Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround
From: Michael Shigorin <mike () osdn org ua>
Date: Fri, 14 Jul 2006 20:32:51 +0300
On Fri, Jul 14, 2006 at 04:50:19PM +0200, Caveo Internet BV - Security wrote:
The most easy way to stop this vulnerability is this by sepcifying the core dump location echo /root/core > /proc/sys/kernel/core_pattern This specifies /root as core dump location which makes it unavailable for the local user.
Better yet (generally),
sysctl -w kernel.core_pattern=/dev/null
[ -f /etc/sysctl.conf ] && { grep -q ^kernel.core_pattern /etc/sysctl.conf || echo kernel.core_pattern = /dev/null >>
/etc/sysctl.conf }
--
---- WBR, Michael Shigorin <mike () altlinux ru>
------ Linux.Kiev http://www.linux.kiev.ua/
Attachment:
_bin
Description:
Current thread:
- rPSA-2006-0122-2 kernel Justin M. Forbes (Jul 13)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Hugo van der Kooij (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michael Shigorin (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Lukasz Trabinski (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michal Zalewski (Jul 18)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)
