This bug was fixed in the package apport - 2.12.6-0ubuntu1

---------------
apport (2.12.6-0ubuntu1) trusty; urgency=low

  * New upstream security/bug fix release:
    - SECURITY FIX: For setuid programs which drop their privileges after
      startup, make the report and core dumps owned by root, to avoid possible
      data disclosure. Also, change core dump files to permissions "0600".
      Thanks to Martin Carpenter for discovering this!
      (CVE-2013-1067, LP: #1242435)
    - sandboxutils.needed_runtime_packages(): Create cache directory for
      Contents.gz if missing. (LP: #933199)
    - apt/dpkg: Recognize options in apt sources.list. (LP: #1238620)
  * Move Vcs-Bzr to trusty branch.
 -- Martin Pitt <[email protected]>   Fri, 25 Oct 2013 06:49:19 +0200

** Changed in: apport (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1242435

Title:
  Desktop setuid cores readable by non-privileged user

Status in Apport crash detection/reporting:
  Fix Released
Status in “apport” package in Ubuntu:
  Fix Released
Status in “apport” source package in Lucid:
  Invalid
Status in “apport” source package in Precise:
  Fix Released
Status in “apport” source package in Quantal:
  Fix Released
Status in “apport” source package in Raring:
  Fix Released
Status in “apport” source package in Saucy:
  Fix Released
Status in “apport” source package in Trusty:
  Fix Released
Status in “apport” package in Debian:
  Confirmed

Bug description:
  Elsewhere I have been working on a sensitive information leak via core
  dump generated by gcore(1).

  The sensitive information in question is read by a stock setuid root
  binary executed by a non-privileged user. On Ubuntu Desktop
  fs.suid_dumpable=2. Referencing
  https://www.kernel.org/doc/Documentation/sysctl/fs.txt:

  2 - (suidsafe) - any binary which normally would not be dumped is dumped
   anyway, but only if the "core_pattern" kernel sysctl is set to
   either a pipe handler or a fully qualified path. (For more details
   on this limitation, see CVE-2006-2451.) This mode is appropriate
   when administrators are attempting to debug problems in a normal
   environment, and either have a core dump pipe handler that knows
   to treat privileged core dumps with care, or specific directory
   defined for catching core dumps. If a core dump happens without
   a pipe handler or fully qualifid path, a message will be emitted
   to syslog warning about the lack of a correct setting.

  NB "treat privileged core dumps with care".

  On a stock Desktop 12.04 LTS install:

      kernel.core_pattern = |/usr/share/apport/apport %p %s %c

  apport dutifully dumps the core and this is readable (0660, user:user)
  by the invoking user, whereas it should be something like 0440,
  root:root. I believe this to be a bug in apport.

  TRUNK FIX: 
http://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/2723
  Backports for older releases available as attachments here.

To manage notifications about this bug go to:
https://bugs.launchpad.net/apport/+bug/1242435/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to