This bug was fixed in the package apport - 2.0.1-0ubuntu17.6

---------------
apport (2.0.1-0ubuntu17.6) precise-security; urgency=low

  * SECURITY UPDATE: incorrect permissions on setuid process core dumps
    (LP: #1242435)
    - use correct permissions when writing the core file in data/apport,
      added test to test/test_signal_crashes.py.
    - Thanks to Martin Pitt for the patch!
    - CVE-2013-1067
 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>   Wed, 23 Oct 2013 13:04:37 
-0400

** Changed in: apport (Ubuntu Precise)
       Status: Triaged => Fix Released

** Changed in: apport (Ubuntu Raring)
       Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1242435

Title:
  Desktop setuid cores readable by non-privileged user

Status in Apport crash detection/reporting:
  In Progress
Status in “apport” package in Ubuntu:
  Triaged
Status in “apport” source package in Lucid:
  Invalid
Status in “apport” source package in Precise:
  Fix Released
Status in “apport” source package in Quantal:
  Fix Released
Status in “apport” source package in Raring:
  Fix Released
Status in “apport” source package in Saucy:
  Fix Released
Status in “apport” source package in Trusty:
  Triaged

Bug description:
  Elsewhere I have been working on a sensitive information leak via core
  dump generated by gcore(1).

  The sensitive information in question is read by a stock setuid root
  binary executed by a non-privileged user. On Ubuntu Desktop
  fs.suid_dumpable=2. Referencing
  https://www.kernel.org/doc/Documentation/sysctl/fs.txt:

  2 - (suidsafe) - any binary which normally would not be dumped is dumped
        anyway, but only if the "core_pattern" kernel sysctl is set to
        either a pipe handler or a fully qualified path. (For more details
        on this limitation, see CVE-2006-2451.) This mode is appropriate
        when administrators are attempting to debug problems in a normal
        environment, and either have a core dump pipe handler that knows
        to treat privileged core dumps with care, or specific directory
        defined for catching core dumps. If a core dump happens without
        a pipe handler or fully qualifid path, a message will be emitted
        to syslog warning about the lack of a correct setting.

  NB "treat privileged core dumps with care".

  On a stock Desktop 12.04 LTS install:

      kernel.core_pattern = |/usr/share/apport/apport %p %s %c

  apport dutifully dumps the core and this is readable (0660, user:user)
  by the invoking user, whereas it should be something like 0440,
  root:root. I believe this to be a bug in apport.

To manage notifications about this bug go to:
https://bugs.launchpad.net/apport/+bug/1242435/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to