2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-22 09:57:41 +00:00

disable_coredump can be set to no on modern OSes without

security consequences.
This commit is contained in:
Todd C. Miller 2015-08-09 16:12:00 -06:00
parent f1053af3b5
commit b2f1bbfb02
6 changed files with 32 additions and 20 deletions

View File

@ -459,9 +459,11 @@ SSEECCUURRIITTYY NNOOTTEESS
To prevent the disclosure of potentially sensitive information, ssuuddoo To prevent the disclosure of potentially sensitive information, ssuuddoo
disables core dumps by default while it is executing (they are re-enabled disables core dumps by default while it is executing (they are re-enabled
for the command that is run). To aid in debugging ssuuddoo crashes, you may for the command that is run). This historical practice dates from a time
wish to re-enable core dumps by setting ``disable_coredump'' to false in when most operating systems allowed setuid processes to dump core by
the sudo.conf(4) file as follows: default. To aid in debugging ssuuddoo crashes, you may wish to re-enable
core dumps by setting ``disable_coredump'' to false in the sudo.conf(4)
file as follows:
Set disable_coredump false Set disable_coredump false

View File

@ -120,18 +120,20 @@ DDEESSCCRRIIPPTTIIOONN
The ssuuddoo..ccoonnff file also supports the following front end settings: The ssuuddoo..ccoonnff file also supports the following front end settings:
disable_coredump disable_coredump
Core dumps of ssuuddoo itself are disabled by default. To aid in Core dumps of ssuuddoo itself are disabled by default to prevent
the disclosure of potentially sensitive information. To aid in
debugging ssuuddoo crashes, you may wish to re-enable core dumps by debugging ssuuddoo crashes, you may wish to re-enable core dumps by
setting ``disable_coredump'' to false in ssuuddoo..ccoonnff as follows: setting ``disable_coredump'' to false in ssuuddoo..ccoonnff as follows:
Set disable_coredump false Set disable_coredump false
Note that most operating systems disable core dumps from setuid All modern operating systems place restrictions on core dumps
programs, including ssuuddoo. To actually get a ssuuddoo core file you from setuid processes like ssuuddoo so this option can be enabled
will likely need to enable core dumps for setuid processes. On without compromising security. To actually get a ssuuddoo core
BSD and Linux systems this is accomplished in the sysctl file you will likely need to enable core dumps for setuid
command. On Solaris, the coreadm command is used to configure processes. On BSD and Linux systems this is accomplished in
core dump behavior. the sysctl command. On Solaris, the coreadm command is used to
configure core dump behavior.
This setting is only available in ssuuddoo version 1.8.4 and This setting is only available in ssuuddoo version 1.8.4 and
higher. higher.

View File

@ -265,7 +265,8 @@ file also supports the following front end settings:
disable_coredump disable_coredump
Core dumps of Core dumps of
\fBsudo\fR \fBsudo\fR
itself are disabled by default. itself are disabled by default to prevent the disclosure of potentially
sensitive information.
To aid in debugging To aid in debugging
\fBsudo\fR \fBsudo\fR
crashes, you may wish to re-enable core dumps by setting crashes, you may wish to re-enable core dumps by setting
@ -281,9 +282,10 @@ Set disable_coredump false
.fi .fi
.RS 10n .RS 10n
.sp .sp
Note that most operating systems disable core dumps from setuid programs, All modern operating systems place restrictions on core dumps
including from setuid processes like
\fBsudo\fR. \fBsudo\fR
so this option can be enabled without compromising security.
To actually get a To actually get a
\fBsudo\fR \fBsudo\fR
core file you will likely need to enable core dumps for setuid processes. core file you will likely need to enable core dumps for setuid processes.

View File

@ -14,7 +14,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.Dd December 4, 2014 .Dd August 9, 2015
.Dt SUDO @mansectform@ .Dt SUDO @mansectform@
.Os Sudo @PACKAGE_VERSION@ .Os Sudo @PACKAGE_VERSION@
.Sh NAME .Sh NAME
@ -241,7 +241,8 @@ file also supports the following front end settings:
.It disable_coredump .It disable_coredump
Core dumps of Core dumps of
.Nm sudo .Nm sudo
itself are disabled by default. itself are disabled by default to prevent the disclosure of potentially
sensitive information.
To aid in debugging To aid in debugging
.Nm sudo .Nm sudo
crashes, you may wish to re-enable core dumps by setting crashes, you may wish to re-enable core dumps by setting
@ -253,9 +254,10 @@ as follows:
Set disable_coredump false Set disable_coredump false
.Ed .Ed
.Pp .Pp
Note that most operating systems disable core dumps from setuid programs, All modern operating systems place restrictions on core dumps
including from setuid processes like
.Nm sudo . .Nm sudo
so this option can be enabled without compromising security.
To actually get a To actually get a
.Nm sudo .Nm sudo
core file you will likely need to enable core dumps for setuid processes. core file you will likely need to enable core dumps for setuid processes.

View File

@ -919,6 +919,8 @@ To prevent the disclosure of potentially sensitive information,
\fBsudo\fR \fBsudo\fR
disables core dumps by default while it is executing (they are disables core dumps by default while it is executing (they are
re-enabled for the command that is run). re-enabled for the command that is run).
This historical practice dates from a time when most operating
systems allowed setuid processes to dump core by default.
To aid in debugging To aid in debugging
\fBsudo\fR \fBsudo\fR
crashes, you may wish to re-enable core dumps by setting crashes, you may wish to re-enable core dumps by setting

View File

@ -19,7 +19,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force .\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512. .\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\" .\"
.Dd August 7, 2015 .Dd August 9, 2015
.Dt SUDO @mansectsu@ .Dt SUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@ .Os Sudo @PACKAGE_VERSION@
.Sh NAME .Sh NAME
@ -854,6 +854,8 @@ To prevent the disclosure of potentially sensitive information,
.Nm .Nm
disables core dumps by default while it is executing (they are disables core dumps by default while it is executing (they are
re-enabled for the command that is run). re-enabled for the command that is run).
This historical practice dates from a time when most operating
systems allowed setuid processes to dump core by default.
To aid in debugging To aid in debugging
.Nm .Nm
crashes, you may wish to re-enable core dumps by setting crashes, you may wish to re-enable core dumps by setting