On Fri, 14 Jul 2006, Caveo Internet BV - Security wrote: > The most easy way to stop this vulnerability is this by sepcifying the core > dump location > > echo /root/core > /proc/sys/kernel/core_pattern > > This specifies /root as core dump location which makes it unavailable for > the local user. This would be just shifting problems. /root is usually not that big. So you end up with a core dump filling up your root disk. Not a pretty sight I might add. Either disable coredumps or send them to a place with plenty of diskspace left and protect that one from prying eyes. Hugo. -- I hate duplicates. Just reply to the relevant mailinglist. hvdkooij@xxxxxxxxxxxxxxx http://hvdkooij.xs4all.nl/ Don't meddle in the affairs of magicians, for they are subtle and quick to anger.