Bugtraq mailing list archives
Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround
From: Michael Shigorin <mike () osdn org ua>
Date: Fri, 14 Jul 2006 20:32:51 +0300
On Fri, Jul 14, 2006 at 04:50:19PM +0200, Caveo Internet BV - Security wrote:
The most easy way to stop this vulnerability is this by sepcifying the core dump location echo /root/core > /proc/sys/kernel/core_pattern This specifies /root as core dump location which makes it unavailable for the local user.
Better yet (generally), sysctl -w kernel.core_pattern=/dev/null [ -f /etc/sysctl.conf ] && { grep -q ^kernel.core_pattern /etc/sysctl.conf || echo kernel.core_pattern = /dev/null >> /etc/sysctl.conf } -- ---- WBR, Michael Shigorin <mike () altlinux ru> ------ Linux.Kiev http://www.linux.kiev.ua/
Attachment:
_bin
Description:
Current thread:
- rPSA-2006-0122-2 kernel Justin M. Forbes (Jul 13)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Hugo van der Kooij (Jul 14)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michael Shigorin (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Lukasz Trabinski (Jul 15)
- Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Michal Zalewski (Jul 18)
- Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround Caveo Internet BV - Security (Jul 14)